Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-48503 (GCVE-0-2022-48503)
Vulnerability from cvelistv5 – Published: 2023-08-14 22:40 – Updated: 2025-10-21 23:05
VLAI?
EPSS
CISA
Summary
The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution.
Severity ?
8.8 (High)
CWE
- Processing web content may lead to arbitrary code execution
Assigner
References
Impacted products
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2025-10-20
Due date: 2025-11-10
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Used in ransomware: Unknown
Notes: https://support.apple.com/en-us/HT213340 ; https://support.apple.com/en-us/HT213341 ; https://support.apple.com/en-us/HT213342 ; https://support.apple.com/en-us/HT213345 ; https://support.apple.com/en-us/HT213346 ; https://nvd.nist.gov/vuln/detail/CVE-2022-48503
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T15:17:54.662Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213345"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213342"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213341"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213340"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213346"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-48503",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-20T14:53:48.228137Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-10-20",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-48503"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-129",
"description": "CWE-129 Improper Validation of Array Index",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:41.290Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-48503"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-10-20T00:00:00+00:00",
"value": "CVE-2022-48503 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "12.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "tvOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Safari",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "8.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Processing web content may lead to arbitrary code execution",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-14T22:40:49.354Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/HT213345"
},
{
"url": "https://support.apple.com/en-us/HT213342"
},
{
"url": "https://support.apple.com/en-us/HT213341"
},
{
"url": "https://support.apple.com/en-us/HT213340"
},
{
"url": "https://support.apple.com/en-us/HT213346"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2022-48503",
"datePublished": "2023-08-14T22:40:49.354Z",
"dateReserved": "2023-06-12T20:53:52.872Z",
"dateUpdated": "2025-10-21T23:05:41.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2022-48503",
"dateAdded": "2025-10-20",
"dueDate": "2025-11-10",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://support.apple.com/en-us/HT213340 ; https://support.apple.com/en-us/HT213341 ; https://support.apple.com/en-us/HT213342 ; https://support.apple.com/en-us/HT213345 ; https://support.apple.com/en-us/HT213346 ; https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"product": "Multiple Products",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "Apple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.",
"vendorProject": "Apple",
"vulnerabilityName": "Apple Multiple Products Unspecified Vulnerability"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.6\", \"matchCriteriaId\": \"5CB295E5-F980-40EC-AF3D-8D5739204C04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.6\", \"matchCriteriaId\": \"F5E4F87A-8003-43EB-99F7-35C82AEA4DC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.6\", \"matchCriteriaId\": \"B6FA9FE3-1891-405C-B191-04CAB84ADD46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12.0.0\", \"versionEndExcluding\": \"12.5\", \"matchCriteriaId\": \"F86C9DC9-3814-4254-A332-257455B6880A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.6\", \"matchCriteriaId\": \"83FC1965-2381-49FF-9521-355D29B28B71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.7\", \"matchCriteriaId\": \"8EB2AF3C-B2A0-41AD-9C3E-14B220620FF0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution.\"}, {\"lang\": \"es\", \"value\": \"El problema se solucion\\u00f3 con comprobaciones de l\\u00edmites mejoradas. Este problema se ha solucionado en tvOS 15.6, watchOS 8.7, iOS 15.6, iPadOS 15.6, macOS Monterey 12.5 and Safari 15.6. El procesamiento de contenido web puede dar lugar a la ejecuci\\u00f3n de c\\u00f3digo arbitrario.\"}]",
"id": "CVE-2022-48503",
"lastModified": "2024-11-21T07:33:27.223",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2023-08-14T23:15:10.490",
"references": "[{\"url\": \"https://support.apple.com/en-us/HT213340\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213341\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213342\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213345\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213346\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213340\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213341\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213342\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213345\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213346\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-48503\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2023-08-14T23:15:10.490\",\"lastModified\":\"2025-10-23T18:47:53.243\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se ha solucionado en tvOS 15.6, watchOS 8.7, iOS 15.6, iPadOS 15.6, macOS Monterey 12.5 and Safari 15.6. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2025-10-20\",\"cisaActionDue\":\"2025-11-10\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Apple Multiple Products Unspecified Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-129\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\",\"matchCriteriaId\":\"5CB295E5-F980-40EC-AF3D-8D5739204C04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\",\"matchCriteriaId\":\"F5E4F87A-8003-43EB-99F7-35C82AEA4DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\",\"matchCriteriaId\":\"B6FA9FE3-1891-405C-B191-04CAB84ADD46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.5\",\"matchCriteriaId\":\"F86C9DC9-3814-4254-A332-257455B6880A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.6\",\"matchCriteriaId\":\"83FC1965-2381-49FF-9521-355D29B28B71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.7\",\"matchCriteriaId\":\"8EB2AF3C-B2A0-41AD-9C3E-14B220620FF0\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/HT213340\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213341\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213342\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213345\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213346\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213341\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213346\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-48503\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213345\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213342\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213341\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213340\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213346\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T15:17:54.662Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-48503\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-20T14:53:48.228137Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2025-10-20\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-48503\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-10-20T00:00:00+00:00\", \"value\": \"CVE-2022-48503 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-48503\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-129\", \"description\": \"CWE-129 Improper Validation of Array Index\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-09T14:24:26.797Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"12.5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"tvOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.6\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"Safari\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.6\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"8.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.6\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213345\"}, {\"url\": \"https://support.apple.com/en-us/HT213342\"}, {\"url\": \"https://support.apple.com/en-us/HT213341\"}, {\"url\": \"https://support.apple.com/en-us/HT213340\"}, {\"url\": \"https://support.apple.com/en-us/HT213346\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The issue was addressed with improved bounds checks. This issue is fixed in tvOS 15.6, watchOS 8.7, iOS 15.6 and iPadOS 15.6, macOS Monterey 12.5, Safari 15.6. Processing web content may lead to arbitrary code execution.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Processing web content may lead to arbitrary code execution\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2023-08-14T22:40:49.354Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-48503\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:05:41.290Z\", \"dateReserved\": \"2023-06-12T20:53:52.872Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2023-08-14T22:40:49.354Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
WID-SEC-W-2022-0782
Vulnerability from csaf_certbund - Published: 2022-07-20 22:00 - Updated: 2025-10-20 22:00Summary
Apple iOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszulösen, seine Privilegien zu erweitern und Informationen falsch darzustellen.
Betroffene Betriebssysteme
- iPhoneOS
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand auszul\u00f6sen, seine Privilegien zu erweitern und Informationen falsch darzustellen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- iPhoneOS",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0782 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0782.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0782 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0782"
},
{
"category": "external",
"summary": "Apple Security Advisory vom 2022-07-20",
"url": "https://support.apple.com/HT213346"
},
{
"category": "external",
"summary": "CISA Known Exploited Vulnerabilities Catalog vom 2025-10-20",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"source_lang": "en-US",
"title": "Apple iOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-20T22:00:00.000+00:00",
"generator": {
"date": "2025-10-21T08:23:25.439+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2022-0782",
"initial_release_date": "2022-07-20T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-07-20T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-07-21T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz aufgenommen"
},
{
"date": "2023-06-21T22:00:00.000+00:00",
"number": "3",
"summary": "CVE-2022-32860, CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503 erg\u00e4nzt"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "4",
"summary": "Aktive Ausnutzung gemeldet"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.6",
"product": {
"name": "Apple iOS \u003c15.6",
"product_id": "T024029"
}
},
{
"category": "product_version",
"name": "15.6",
"product": {
"name": "Apple iOS 15.6",
"product_id": "T024029-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:iphone_os:15.6"
}
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.6",
"product": {
"name": "Apple iPadOS \u003c15.6",
"product_id": "T024030"
}
},
{
"category": "product_version",
"name": "15.6",
"product": {
"name": "Apple iPadOS 15.6",
"product_id": "T024030-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:ipados:15.6"
}
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2294",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-2294"
},
{
"cve": "CVE-2022-26768",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-26768"
},
{
"cve": "CVE-2022-26981",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-26981"
},
{
"cve": "CVE-2022-32784",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32784"
},
{
"cve": "CVE-2022-32785",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32785"
},
{
"cve": "CVE-2022-32787",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32787"
},
{
"cve": "CVE-2022-32788",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32788"
},
{
"cve": "CVE-2022-32792",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32792"
},
{
"cve": "CVE-2022-32793",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32793"
},
{
"cve": "CVE-2022-32802",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32802"
},
{
"cve": "CVE-2022-32810",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32810"
},
{
"cve": "CVE-2022-32813",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32813"
},
{
"cve": "CVE-2022-32814",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32814"
},
{
"cve": "CVE-2022-32815",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32815"
},
{
"cve": "CVE-2022-32816",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32816"
},
{
"cve": "CVE-2022-32817",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32817"
},
{
"cve": "CVE-2022-32819",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32819"
},
{
"cve": "CVE-2022-32820",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32820"
},
{
"cve": "CVE-2022-32821",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32821"
},
{
"cve": "CVE-2022-32823",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32823"
},
{
"cve": "CVE-2022-32824",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32824"
},
{
"cve": "CVE-2022-32825",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32825"
},
{
"cve": "CVE-2022-32826",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32826"
},
{
"cve": "CVE-2022-32828",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32828"
},
{
"cve": "CVE-2022-32829",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32829"
},
{
"cve": "CVE-2022-32830",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32830"
},
{
"cve": "CVE-2022-32832",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32832"
},
{
"cve": "CVE-2022-32837",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32837"
},
{
"cve": "CVE-2022-32838",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32838"
},
{
"cve": "CVE-2022-32839",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32839"
},
{
"cve": "CVE-2022-32840",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32840"
},
{
"cve": "CVE-2022-32841",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32841"
},
{
"cve": "CVE-2022-32844",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32844"
},
{
"cve": "CVE-2022-32845",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32845"
},
{
"cve": "CVE-2022-32847",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32847"
},
{
"cve": "CVE-2022-32849",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32849"
},
{
"cve": "CVE-2022-32855",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32855"
},
{
"cve": "CVE-2022-32857",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32857"
},
{
"cve": "CVE-2022-32860",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32860"
},
{
"cve": "CVE-2022-32885",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32885"
},
{
"cve": "CVE-2022-32948",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32948"
},
{
"cve": "CVE-2022-42805",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-42805"
},
{
"cve": "CVE-2022-48503",
"product_status": {
"known_affected": [
"T024030",
"T024029"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-48503"
}
]
}
WID-SEC-W-2022-0778
Vulnerability from csaf_certbund - Published: 2022-07-20 22:00 - Updated: 2025-10-20 22:00Summary
Apple macOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsmaßnahmen zu umgehen, beliebigen Code auszuführen, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuführen.
Betroffene Betriebssysteme
- MacOS X
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern, Sicherheitsma\u00dfnahmen zu umgehen, beliebigen Code auszuf\u00fchren, Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, Informationen falsch darzustellen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0778 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0778.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0778 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0778"
},
{
"category": "external",
"summary": "Apple Security Advisroy vom 2022-07-20",
"url": "https://support.apple.com/en-us/HT213343"
},
{
"category": "external",
"summary": "Apple Security Advisroy vom 2022-07-20",
"url": "https://support.apple.com/en-us/HT213344"
},
{
"category": "external",
"summary": "Apple Security Advisroy vom 2022-07-20",
"url": "https://support.apple.com/en-us/HT213345"
},
{
"category": "external",
"summary": "Known Exploited Vulnerabilities Catalog vom 2025-10-20",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-20T22:00:00.000+00:00",
"generator": {
"date": "2025-10-21T08:28:29.099+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2022-0778",
"initial_release_date": "2022-07-20T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-07-20T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-07-21T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz erg\u00e4nzt"
},
{
"date": "2022-09-20T22:00:00.000+00:00",
"number": "3",
"summary": "CVE Nummern CVE-2022-32861, CVE-2022-32863, CVE-2022-32880 erg\u00e4nzt"
},
{
"date": "2022-10-06T22:00:00.000+00:00",
"number": "4",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2023-06-21T22:00:00.000+00:00",
"number": "5",
"summary": "CVE-2022-32885, CVE-2022-32948, CVE-2022-42805, CVE-2022-48503, CVE-2022-32860 erg\u00e4nzt"
},
{
"date": "2025-10-20T22:00:00.000+00:00",
"number": "6",
"summary": "Aktive Ausnutzung gemeldet"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Catalina \u003c2022-005",
"product": {
"name": "Apple macOS Catalina \u003c2022-005",
"product_id": "T023996"
}
},
{
"category": "product_version",
"name": "Catalina 2022-005",
"product": {
"name": "Apple macOS Catalina 2022-005",
"product_id": "T023996-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:catalina__2022-005"
}
}
},
{
"category": "product_version_range",
"name": "Big Sur \u003c11.6.8",
"product": {
"name": "Apple macOS Big Sur \u003c11.6.8",
"product_id": "T023997"
}
},
{
"category": "product_version",
"name": "Big Sur 11.6.8",
"product": {
"name": "Apple macOS Big Sur 11.6.8",
"product_id": "T023997-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:big_sur__11.6.8"
}
}
},
{
"category": "product_version_range",
"name": "Monterey \u003c12.5",
"product": {
"name": "Apple macOS Monterey \u003c12.5",
"product_id": "T023998"
}
},
{
"category": "product_version",
"name": "Monterey 12.5",
"product": {
"name": "Apple macOS Monterey 12.5",
"product_id": "T023998-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:monterey__12.5"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-28544",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-28544"
},
{
"cve": "CVE-2021-4136",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4166",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-4173",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-4173"
},
{
"cve": "CVE-2021-4187",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-4187"
},
{
"cve": "CVE-2021-4192",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-46059",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2021-46059"
},
{
"cve": "CVE-2022-0128",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0156",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-0156"
},
{
"cve": "CVE-2022-0158",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-0158"
},
{
"cve": "CVE-2022-2294",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-2294"
},
{
"cve": "CVE-2022-24070",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-24070"
},
{
"cve": "CVE-2022-26704",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-26704"
},
{
"cve": "CVE-2022-26981",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-26981"
},
{
"cve": "CVE-2022-29046",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-29046"
},
{
"cve": "CVE-2022-29048",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-29048"
},
{
"cve": "CVE-2022-32781",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32781"
},
{
"cve": "CVE-2022-32785",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32785"
},
{
"cve": "CVE-2022-32786",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32786"
},
{
"cve": "CVE-2022-32787",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32787"
},
{
"cve": "CVE-2022-32789",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32789"
},
{
"cve": "CVE-2022-32792",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32792"
},
{
"cve": "CVE-2022-32793",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32793"
},
{
"cve": "CVE-2022-32796",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32796"
},
{
"cve": "CVE-2022-32797",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32797"
},
{
"cve": "CVE-2022-32798",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32798"
},
{
"cve": "CVE-2022-32799",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32799"
},
{
"cve": "CVE-2022-32800",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32800"
},
{
"cve": "CVE-2022-32801",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32801"
},
{
"cve": "CVE-2022-32805",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32805"
},
{
"cve": "CVE-2022-32807",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32807"
},
{
"cve": "CVE-2022-32810",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32810"
},
{
"cve": "CVE-2022-32811",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32811"
},
{
"cve": "CVE-2022-32812",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32812"
},
{
"cve": "CVE-2022-32813",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32813"
},
{
"cve": "CVE-2022-32814",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32814"
},
{
"cve": "CVE-2022-32815",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32815"
},
{
"cve": "CVE-2022-32816",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32816"
},
{
"cve": "CVE-2022-32817",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32817"
},
{
"cve": "CVE-2022-32818",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32818"
},
{
"cve": "CVE-2022-32819",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32819"
},
{
"cve": "CVE-2022-32820",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32820"
},
{
"cve": "CVE-2022-32821",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32821"
},
{
"cve": "CVE-2022-32823",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32823"
},
{
"cve": "CVE-2022-32825",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32825"
},
{
"cve": "CVE-2022-32826",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32826"
},
{
"cve": "CVE-2022-32828",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32828"
},
{
"cve": "CVE-2022-32829",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32829"
},
{
"cve": "CVE-2022-32831",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32831"
},
{
"cve": "CVE-2022-32832",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32832"
},
{
"cve": "CVE-2022-32834",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32834"
},
{
"cve": "CVE-2022-32837",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32837"
},
{
"cve": "CVE-2022-32838",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32838"
},
{
"cve": "CVE-2022-32839",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32839"
},
{
"cve": "CVE-2022-32840",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32840"
},
{
"cve": "CVE-2022-32841",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32841"
},
{
"cve": "CVE-2022-32842",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32842"
},
{
"cve": "CVE-2022-32843",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32843"
},
{
"cve": "CVE-2022-32845",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32845"
},
{
"cve": "CVE-2022-32847",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32847"
},
{
"cve": "CVE-2022-32848",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32848"
},
{
"cve": "CVE-2022-32849",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32849"
},
{
"cve": "CVE-2022-32851",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32851"
},
{
"cve": "CVE-2022-32852",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32852"
},
{
"cve": "CVE-2022-32853",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32853"
},
{
"cve": "CVE-2022-32857",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32857"
},
{
"cve": "CVE-2022-32860",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32860"
},
{
"cve": "CVE-2022-32861",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32861"
},
{
"cve": "CVE-2022-32863",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32863"
},
{
"cve": "CVE-2022-32880",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32880"
},
{
"cve": "CVE-2022-32885",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32885"
},
{
"cve": "CVE-2022-32910",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32910"
},
{
"cve": "CVE-2022-32948",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-32948"
},
{
"cve": "CVE-2022-42805",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-42805"
},
{
"cve": "CVE-2022-48503",
"product_status": {
"known_affected": [
"T023996",
"T023997",
"T023998"
]
},
"release_date": "2022-07-20T22:00:00.000+00:00",
"title": "CVE-2022-48503"
}
]
}
RHSA-2023_2256
Vulnerability from csaf_redhat - Published: 2023-05-09 09:52 - Updated: 2024-11-22 21:06Summary
Red Hat Security Advisory: webkit2gtk3 security and bug fix update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2256",
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
},
{
"category": "external",
"summary": "2127467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127467"
},
{
"category": "external",
"summary": "2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2256.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T21:06:04+00:00",
"generator": {
"date": "2024-11-22T21:06:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:2256",
"initial_release_date": "2023-05-09T09:52:48+00:00",
"revision_history": [
{
"date": "2023-05-09T09:52:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-09T09:52:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T21:06:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.src",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.src",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.src",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32886",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128643"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: buffer overflow issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32886"
},
{
"category": "external",
"summary": "RHBZ#2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: buffer overflow issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-32888",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140501"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32888"
},
{
"category": "external",
"summary": "RHBZ#2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32923",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: correctness issue in the JIT was addressed with improved checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32923"
},
{
"category": "external",
"summary": "RHBZ#2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: correctness issue in the JIT was addressed with improved checks"
},
{
"cve": "CVE-2022-42799",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140503"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: issue was addressed with improved UI handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42799"
},
{
"category": "external",
"summary": "RHBZ#2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: issue was addressed with improved UI handling"
},
{
"cve": "CVE-2022-42823",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42823"
},
{
"category": "external",
"summary": "RHBZ#2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42824",
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140504"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: sensitive information disclosure issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42824"
},
{
"category": "external",
"summary": "RHBZ#2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: sensitive information disclosure issue"
},
{
"cve": "CVE-2022-42826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167716"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42826"
},
{
"category": "external",
"summary": "RHBZ#2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42852",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory disclosure issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42852"
},
{
"category": "external",
"summary": "RHBZ#2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory disclosure issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-42863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42863"
},
{
"category": "external",
"summary": "RHBZ#2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42867",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42867"
},
{
"category": "external",
"summary": "RHBZ#2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46691",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46691"
},
{
"category": "external",
"summary": "RHBZ#2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46692",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156991"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46692"
},
{
"category": "external",
"summary": "RHBZ#2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass issue"
},
{
"cve": "CVE-2022-46698",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156992"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue leading to user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46698"
},
{
"category": "external",
"summary": "RHBZ#2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue leading to user information disclosure"
},
{
"cve": "CVE-2022-46699",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156993"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46699"
},
{
"category": "external",
"summary": "RHBZ#2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46700",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156994"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46700"
},
{
"category": "external",
"summary": "RHBZ#2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23517",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167717"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23517"
},
{
"category": "external",
"summary": "RHBZ#2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23518",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167715"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23518"
},
{
"category": "external",
"summary": "RHBZ#2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-25358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175099"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25358"
},
{
"category": "external",
"summary": "RHBZ#2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242683",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()"
},
{
"cve": "CVE-2023-25360",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175101"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::renderer in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25360"
},
{
"category": "external",
"summary": "RHBZ#2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242686",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242686"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()"
},
{
"cve": "CVE-2023-25361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175103"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25361"
},
{
"category": "external",
"summary": "RHBZ#2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25361"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244249",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244249"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()"
},
{
"cve": "CVE-2023-25362",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175105"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25362"
},
{
"category": "external",
"summary": "RHBZ#2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244802",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244802"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()"
},
{
"cve": "CVE-2023-25363",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175107"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25363"
},
{
"category": "external",
"summary": "RHBZ#2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242684",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242684"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()"
}
]
}
RHSA-2023:2834
Vulnerability from csaf_redhat - Published: 2023-05-16 08:54 - Updated: 2025-11-21 18:40Summary
Red Hat Security Advisory: webkit2gtk3 security and bug fix update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2834",
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index"
},
{
"category": "external",
"summary": "2127468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127468"
},
{
"category": "external",
"summary": "2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "2150970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150970"
},
{
"category": "external",
"summary": "2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2834.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:40:23+00:00",
"generator": {
"date": "2025-11-21T18:40:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:2834",
"initial_release_date": "2023-05-16T08:54:42+00:00",
"revision_history": [
{
"date": "2023-05-16T08:54:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-16T08:54:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:40:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.src",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.src",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32886",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128643"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: buffer overflow issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32886"
},
{
"category": "external",
"summary": "RHBZ#2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: buffer overflow issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-32888",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140501"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32888"
},
{
"category": "external",
"summary": "RHBZ#2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32923",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: correctness issue in the JIT was addressed with improved checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32923"
},
{
"category": "external",
"summary": "RHBZ#2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: correctness issue in the JIT was addressed with improved checks"
},
{
"cve": "CVE-2022-42799",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140503"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: issue was addressed with improved UI handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42799"
},
{
"category": "external",
"summary": "RHBZ#2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: issue was addressed with improved UI handling"
},
{
"cve": "CVE-2022-42823",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42823"
},
{
"category": "external",
"summary": "RHBZ#2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42824",
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140504"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: sensitive information disclosure issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42824"
},
{
"category": "external",
"summary": "RHBZ#2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: sensitive information disclosure issue"
},
{
"cve": "CVE-2022-42826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167716"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42826"
},
{
"category": "external",
"summary": "RHBZ#2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42852",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory disclosure issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42852"
},
{
"category": "external",
"summary": "RHBZ#2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory disclosure issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-42863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42863"
},
{
"category": "external",
"summary": "RHBZ#2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42867",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42867"
},
{
"category": "external",
"summary": "RHBZ#2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46691",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46691"
},
{
"category": "external",
"summary": "RHBZ#2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46692",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156991"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46692"
},
{
"category": "external",
"summary": "RHBZ#2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass issue"
},
{
"cve": "CVE-2022-46698",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156992"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue leading to user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46698"
},
{
"category": "external",
"summary": "RHBZ#2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue leading to user information disclosure"
},
{
"cve": "CVE-2022-46699",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156993"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46699"
},
{
"category": "external",
"summary": "RHBZ#2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46700",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156994"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46700"
},
{
"category": "external",
"summary": "RHBZ#2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23517",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167717"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23517"
},
{
"category": "external",
"summary": "RHBZ#2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23518",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167715"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23518"
},
{
"category": "external",
"summary": "RHBZ#2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-25358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175099"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25358"
},
{
"category": "external",
"summary": "RHBZ#2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242683",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()"
},
{
"cve": "CVE-2023-25360",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175101"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::renderer in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25360"
},
{
"category": "external",
"summary": "RHBZ#2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242686",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242686"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()"
},
{
"cve": "CVE-2023-25361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175103"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25361"
},
{
"category": "external",
"summary": "RHBZ#2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25361"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244249",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244249"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()"
},
{
"cve": "CVE-2023-25362",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175105"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25362"
},
{
"category": "external",
"summary": "RHBZ#2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244802",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244802"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()"
},
{
"cve": "CVE-2023-25363",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175107"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25363"
},
{
"category": "external",
"summary": "RHBZ#2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242684",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242684"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()"
}
]
}
RHSA-2023:2256
Vulnerability from csaf_redhat - Published: 2023-05-09 09:52 - Updated: 2025-11-21 18:39Summary
Red Hat Security Advisory: webkit2gtk3 security and bug fix update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2256",
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
},
{
"category": "external",
"summary": "2127467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127467"
},
{
"category": "external",
"summary": "2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2256.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T18:39:59+00:00",
"generator": {
"date": "2025-11-21T18:39:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:2256",
"initial_release_date": "2023-05-09T09:52:48+00:00",
"revision_history": [
{
"date": "2023-05-09T09:52:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-09T09:52:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:39:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.src",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.src",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.src",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32886",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128643"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: buffer overflow issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32886"
},
{
"category": "external",
"summary": "RHBZ#2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: buffer overflow issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-32888",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140501"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32888"
},
{
"category": "external",
"summary": "RHBZ#2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32923",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: correctness issue in the JIT was addressed with improved checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32923"
},
{
"category": "external",
"summary": "RHBZ#2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: correctness issue in the JIT was addressed with improved checks"
},
{
"cve": "CVE-2022-42799",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140503"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: issue was addressed with improved UI handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42799"
},
{
"category": "external",
"summary": "RHBZ#2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: issue was addressed with improved UI handling"
},
{
"cve": "CVE-2022-42823",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42823"
},
{
"category": "external",
"summary": "RHBZ#2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42824",
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140504"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: sensitive information disclosure issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42824"
},
{
"category": "external",
"summary": "RHBZ#2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: sensitive information disclosure issue"
},
{
"cve": "CVE-2022-42826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167716"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42826"
},
{
"category": "external",
"summary": "RHBZ#2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42852",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory disclosure issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42852"
},
{
"category": "external",
"summary": "RHBZ#2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory disclosure issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-42863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42863"
},
{
"category": "external",
"summary": "RHBZ#2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42867",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42867"
},
{
"category": "external",
"summary": "RHBZ#2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46691",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46691"
},
{
"category": "external",
"summary": "RHBZ#2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46692",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156991"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46692"
},
{
"category": "external",
"summary": "RHBZ#2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass issue"
},
{
"cve": "CVE-2022-46698",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156992"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue leading to user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46698"
},
{
"category": "external",
"summary": "RHBZ#2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue leading to user information disclosure"
},
{
"cve": "CVE-2022-46699",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156993"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46699"
},
{
"category": "external",
"summary": "RHBZ#2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46700",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156994"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46700"
},
{
"category": "external",
"summary": "RHBZ#2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23517",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167717"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23517"
},
{
"category": "external",
"summary": "RHBZ#2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23518",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167715"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23518"
},
{
"category": "external",
"summary": "RHBZ#2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-25358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175099"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25358"
},
{
"category": "external",
"summary": "RHBZ#2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242683",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()"
},
{
"cve": "CVE-2023-25360",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175101"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::renderer in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25360"
},
{
"category": "external",
"summary": "RHBZ#2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242686",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242686"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()"
},
{
"cve": "CVE-2023-25361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175103"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25361"
},
{
"category": "external",
"summary": "RHBZ#2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25361"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244249",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244249"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()"
},
{
"cve": "CVE-2023-25362",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175105"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25362"
},
{
"category": "external",
"summary": "RHBZ#2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244802",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244802"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()"
},
{
"cve": "CVE-2023-25363",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175107"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25363"
},
{
"category": "external",
"summary": "RHBZ#2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242684",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242684"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T09:52:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2256"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.src",
"AppStream-9.2.0.GA:webkit2gtk3-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el9.x86_64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.aarch64",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.i686",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.ppc64le",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.s390x",
"AppStream-9.2.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()"
}
]
}
RHSA-2024:9653
Vulnerability from csaf_redhat - Published: 2024-11-14 12:21 - Updated: 2025-11-21 19:17Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)
* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9653",
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/vulnerabilities/",
"url": "https://access.redhat.com/security/vulnerabilities/"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9653.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-11-21T19:17:15+00:00",
"generator": {
"date": "2025-11-21T19:17:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:9653",
"initial_release_date": "2024-11-14T12:21:26+00:00",
"revision_history": [
{
"date": "2024-11-14T12:21:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T12:21:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:17:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T12:21:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9653"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x",
"AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686",
"AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
}
]
}
RHSA-2024:9679
Vulnerability from csaf_redhat - Published: 2024-11-14 15:34 - Updated: 2025-11-21 19:17Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)
* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:9679",
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9679.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-11-21T19:17:11+00:00",
"generator": {
"date": "2025-11-21T19:17:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:9679",
"initial_release_date": "2024-11-14T15:34:16+00:00",
"revision_history": [
{
"date": "2024-11-14T15:34:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-11-14T15:34:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:17:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
"product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44185",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T20:05:39.339000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323263"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44185"
},
{
"category": "external",
"summary": "RHBZ#2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44185"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0006.html",
"url": "https://webkitgtk.org/security/WSA-2024-0006.html"
}
],
"release_date": "2024-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-44244",
"cwe": {
"id": "CWE-788",
"name": "Access of Memory Location After End of Buffer"
},
"discovery_date": "2024-11-01T21:06:58.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323278"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-44244"
},
{
"category": "external",
"summary": "RHBZ#2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44244"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash"
},
{
"cve": "CVE-2024-54534",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2024-12-23T13:18:32.596325+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2333846"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-54534"
},
{
"category": "external",
"summary": "RHBZ#2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121837",
"url": "https://support.apple.com/en-us/121837"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121839",
"url": "https://support.apple.com/en-us/121839"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121843",
"url": "https://support.apple.com/en-us/121843"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121844",
"url": "https://support.apple.com/en-us/121844"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121845",
"url": "https://support.apple.com/en-us/121845"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/121846",
"url": "https://support.apple.com/en-us/121846"
}
],
"release_date": "2024-12-11T22:58:39.974000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24223",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:03:40.562000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366499"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24223"
},
{
"category": "external",
"summary": "RHBZ#2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24223"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-24264",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2025-04-07T14:31:23.097000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2357918"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24264"
},
{
"category": "external",
"summary": "RHBZ#2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24264"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0003.html",
"url": "https://webkitgtk.org/security/WSA-2025-0003.html"
}
],
"release_date": "2025-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31204",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2025-05-15T13:04:43.281000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366500"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31204"
},
{
"category": "external",
"summary": "RHBZ#2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption"
},
{
"cve": "CVE-2025-31206",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2025-05-15T13:06:54.355000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366502"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31206"
},
{
"category": "external",
"summary": "RHBZ#2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31206"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash"
},
{
"cve": "CVE-2025-31215",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2025-05-15T13:07:56.027000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366503"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-31215"
},
{
"category": "external",
"summary": "RHBZ#2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31215"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-11-14T15:34:16+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:9679"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le",
"AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686",
"AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash"
}
]
}
RHSA-2023_2834
Vulnerability from csaf_redhat - Published: 2023-05-16 08:54 - Updated: 2024-11-22 21:06Summary
Red Hat Security Advisory: webkit2gtk3 security and bug fix update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer() (CVE-2023-25360)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling() (CVE-2023-25361)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps() (CVE-2023-25362)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags() (CVE-2023-25363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.8 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2834",
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.8_release_notes/index"
},
{
"category": "external",
"summary": "2127468",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2127468"
},
{
"category": "external",
"summary": "2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "2150970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150970"
},
{
"category": "external",
"summary": "2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2834.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update",
"tracking": {
"current_release_date": "2024-11-22T21:06:14+00:00",
"generator": {
"date": "2024-11-22T21:06:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:2834",
"initial_release_date": "2023-05-16T08:54:42+00:00",
"revision_history": [
{
"date": "2023-05-16T08:54:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-16T08:54:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T21:06:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.src",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.src",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.8.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-32886",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128643"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: buffer overflow issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32886"
},
{
"category": "external",
"summary": "RHBZ#2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: buffer overflow issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-32888",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140501"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32888"
},
{
"category": "external",
"summary": "RHBZ#2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32923",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: correctness issue in the JIT was addressed with improved checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32923"
},
{
"category": "external",
"summary": "RHBZ#2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: correctness issue in the JIT was addressed with improved checks"
},
{
"cve": "CVE-2022-42799",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140503"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: issue was addressed with improved UI handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42799"
},
{
"category": "external",
"summary": "RHBZ#2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: issue was addressed with improved UI handling"
},
{
"cve": "CVE-2022-42823",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42823"
},
{
"category": "external",
"summary": "RHBZ#2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42824",
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140504"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: sensitive information disclosure issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42824"
},
{
"category": "external",
"summary": "RHBZ#2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: sensitive information disclosure issue"
},
{
"cve": "CVE-2022-42826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167716"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42826"
},
{
"category": "external",
"summary": "RHBZ#2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42852",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory disclosure issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42852"
},
{
"category": "external",
"summary": "RHBZ#2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory disclosure issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-42863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42863"
},
{
"category": "external",
"summary": "RHBZ#2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42867",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42867"
},
{
"category": "external",
"summary": "RHBZ#2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46691",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46691"
},
{
"category": "external",
"summary": "RHBZ#2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46692",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156991"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46692"
},
{
"category": "external",
"summary": "RHBZ#2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass issue"
},
{
"cve": "CVE-2022-46698",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156992"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue leading to user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46698"
},
{
"category": "external",
"summary": "RHBZ#2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue leading to user information disclosure"
},
{
"cve": "CVE-2022-46699",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156993"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46699"
},
{
"category": "external",
"summary": "RHBZ#2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46700",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156994"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46700"
},
{
"category": "external",
"summary": "RHBZ#2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23517",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167717"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23517"
},
{
"category": "external",
"summary": "RHBZ#2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23518",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167715"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23518"
},
{
"category": "external",
"summary": "RHBZ#2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-25358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175099"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25358"
},
{
"category": "external",
"summary": "RHBZ#2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242683",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()"
},
{
"cve": "CVE-2023-25360",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175101"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::renderer in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25360"
},
{
"category": "external",
"summary": "RHBZ#2175101",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175101"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25360"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25360"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242686",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242686"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::renderer()"
},
{
"cve": "CVE-2023-25361",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175103"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::setNextSibling in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25361"
},
{
"category": "external",
"summary": "RHBZ#2175103",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175103"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25361"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25361"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244249",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244249"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::setNextSibling()"
},
{
"cve": "CVE-2023-25362",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175105"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::repaintBlockSelectionGaps in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25362"
},
{
"category": "external",
"summary": "RHBZ#2175105",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175105"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25362"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=244802",
"url": "https://bugs.webkit.org/show_bug.cgi?id=244802"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::repaintBlockSelectionGaps()"
},
{
"cve": "CVE-2023-25363",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175107"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::updateDescendantDependentFlags in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25363"
},
{
"category": "external",
"summary": "RHBZ#2175107",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175107"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25363"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242684",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242684"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-16T08:54:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2834"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.src",
"AppStream-8.8.0.GA:webkit2gtk3-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-debugsource-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-0:2.38.5-1.el8.x86_64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.aarch64",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.i686",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.ppc64le",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.s390x",
"AppStream-8.8.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::updateDescendantDependentFlags()"
}
]
}
RHSA-2025:10364
Vulnerability from csaf_redhat - Published: 2025-07-07 02:28 - Updated: 2025-11-21 19:19Summary
Red Hat Security Advisory: webkitgtk4 security update
Notes
Topic
An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.
Security Fix(es):
* webkitgtk: Command injection in web inspector (CVE-2020-9862)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)
* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)
* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)
* webkitgtk: Access issue in content security policy (CVE-2020-9915)
* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)
* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)
* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)
* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)
* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)
* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)
* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)
* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)
* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)
* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)
* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)
* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)
* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)
* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)
* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)
* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)
* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)
* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)
* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)
* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)
* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)
* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)
* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)
* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)
* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)
* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)
* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)
* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)
* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)
* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)
* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)
* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)
* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)
* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)
* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)
* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)
* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)
* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)
* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)
* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)
* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)
* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)
* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)
* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)
* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)
* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)
* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)
* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)
* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)
* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)
* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)
* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)
* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)
* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)
* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)
* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)
* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)
* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)
* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)
* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)
* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)
* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)
* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)
* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)
* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)
* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)
* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)
* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)
* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)
* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)
* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)
* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)
* webkitgtk: arbitrary code execution (CVE-2023-37450)
* webkitgtk: arbitrary code execution (CVE-2023-32393)
* webkitgtk: disclose sensitive information (CVE-2023-38133)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)
* webkitgtk: arbitrary code execution (CVE-2023-38594)
* webkitgtk: arbitrary code execution (CVE-2023-38595)
* webkitgtk: track sensitive user information (CVE-2023-38599)
* webkitgtk: arbitrary code execution (CVE-2023-38600)
* webkitgtk: arbitrary code execution (CVE-2023-38611)
* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)
* webkitgtk: arbitrary code execution (CVE-2023-38597)
* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)
* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)
* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)
* webkitgtk: use after free vulnerability (CVE-2023-28198)
* webkitgtk: content security policy blacklist failure (CVE-2023-32370)
* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)
* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)
* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)
* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)
* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)
* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)
* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)
* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)
* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)
* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)
* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)
* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)
* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)
* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)
* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)
* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)
* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)
* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)
* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)
* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)
* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)
* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkit: pointer authentication bypass (CVE-2024-27834)
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)
* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)
* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)
* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)
* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)
* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)
* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)
* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)
* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)
* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)
* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)
* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)
* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)
* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10364",
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1879532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532"
},
{
"category": "external",
"summary": "1879535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535"
},
{
"category": "external",
"summary": "1879536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536"
},
{
"category": "external",
"summary": "1879538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538"
},
{
"category": "external",
"summary": "1879540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540"
},
{
"category": "external",
"summary": "1879541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541"
},
{
"category": "external",
"summary": "1879545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545"
},
{
"category": "external",
"summary": "1879557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557"
},
{
"category": "external",
"summary": "1879559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559"
},
{
"category": "external",
"summary": "1879563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563"
},
{
"category": "external",
"summary": "1879564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564"
},
{
"category": "external",
"summary": "1879566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566"
},
{
"category": "external",
"summary": "1879568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568"
},
{
"category": "external",
"summary": "1879570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570"
},
{
"category": "external",
"summary": "1901212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212"
},
{
"category": "external",
"summary": "1901214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214"
},
{
"category": "external",
"summary": "1901216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216"
},
{
"category": "external",
"summary": "1901219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219"
},
{
"category": "external",
"summary": "1901221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221"
},
{
"category": "external",
"summary": "1903568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568"
},
{
"category": "external",
"summary": "1928886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886"
},
{
"category": "external",
"summary": "1944323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323"
},
{
"category": "external",
"summary": "1944329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329"
},
{
"category": "external",
"summary": "1944331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331"
},
{
"category": "external",
"summary": "1944333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333"
},
{
"category": "external",
"summary": "1944337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337"
},
{
"category": "external",
"summary": "1944340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340"
},
{
"category": "external",
"summary": "1944343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343"
},
{
"category": "external",
"summary": "1944350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350"
},
{
"category": "external",
"summary": "1944859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859"
},
{
"category": "external",
"summary": "1944862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862"
},
{
"category": "external",
"summary": "1944867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867"
},
{
"category": "external",
"summary": "1980441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441"
},
{
"category": "external",
"summary": "1986852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852"
},
{
"category": "external",
"summary": "1986856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856"
},
{
"category": "external",
"summary": "1986858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858"
},
{
"category": "external",
"summary": "1986860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860"
},
{
"category": "external",
"summary": "1986863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863"
},
{
"category": "external",
"summary": "1986866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866"
},
{
"category": "external",
"summary": "1986870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870"
},
{
"category": "external",
"summary": "1986872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872"
},
{
"category": "external",
"summary": "1986874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874"
},
{
"category": "external",
"summary": "1986877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877"
},
{
"category": "external",
"summary": "1986879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879"
},
{
"category": "external",
"summary": "1986881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881"
},
{
"category": "external",
"summary": "1986883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883"
},
{
"category": "external",
"summary": "1986886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886"
},
{
"category": "external",
"summary": "1986888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888"
},
{
"category": "external",
"summary": "1986890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890"
},
{
"category": "external",
"summary": "1986892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892"
},
{
"category": "external",
"summary": "1986894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894"
},
{
"category": "external",
"summary": "1986898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898"
},
{
"category": "external",
"summary": "1986900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900"
},
{
"category": "external",
"summary": "1986902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902"
},
{
"category": "external",
"summary": "1986906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906"
},
{
"category": "external",
"summary": "2016673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673"
},
{
"category": "external",
"summary": "2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "2037469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469"
},
{
"category": "external",
"summary": "2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "2082544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544"
},
{
"category": "external",
"summary": "2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "2104788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788"
},
{
"category": "external",
"summary": "2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "2121645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645"
},
{
"category": "external",
"summary": "2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "2128645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645"
},
{
"category": "external",
"summary": "2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "2153683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683"
},
{
"category": "external",
"summary": "2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "2169934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934"
},
{
"category": "external",
"summary": "2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "2185724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724"
},
{
"category": "external",
"summary": "2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "2218626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626"
},
{
"category": "external",
"summary": "2218640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640"
},
{
"category": "external",
"summary": "2223000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000"
},
{
"category": "external",
"summary": "2224608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608"
},
{
"category": "external",
"summary": "2231015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015"
},
{
"category": "external",
"summary": "2231017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017"
},
{
"category": "external",
"summary": "2231018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018"
},
{
"category": "external",
"summary": "2231019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019"
},
{
"category": "external",
"summary": "2231020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020"
},
{
"category": "external",
"summary": "2231021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021"
},
{
"category": "external",
"summary": "2231022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022"
},
{
"category": "external",
"summary": "2231028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028"
},
{
"category": "external",
"summary": "2231043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043"
},
{
"category": "external",
"summary": "2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "2236843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843"
},
{
"category": "external",
"summary": "2236844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844"
},
{
"category": "external",
"summary": "2238943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943"
},
{
"category": "external",
"summary": "2238944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944"
},
{
"category": "external",
"summary": "2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "2240522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522"
},
{
"category": "external",
"summary": "2241400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400"
},
{
"category": "external",
"summary": "2241403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403"
},
{
"category": "external",
"summary": "2241409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409"
},
{
"category": "external",
"summary": "2241412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412"
},
{
"category": "external",
"summary": "2253054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054"
},
{
"category": "external",
"summary": "2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "2254326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326"
},
{
"category": "external",
"summary": "2254327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327"
},
{
"category": "external",
"summary": "2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "2270141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141"
},
{
"category": "external",
"summary": "2270143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143"
},
{
"category": "external",
"summary": "2270146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146"
},
{
"category": "external",
"summary": "2270151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151"
},
{
"category": "external",
"summary": "2270288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288"
},
{
"category": "external",
"summary": "2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "2271437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437"
},
{
"category": "external",
"summary": "2271441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441"
},
{
"category": "external",
"summary": "2271444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444"
},
{
"category": "external",
"summary": "2271446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446"
},
{
"category": "external",
"summary": "2271449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449"
},
{
"category": "external",
"summary": "2271453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453"
},
{
"category": "external",
"summary": "2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "2271717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717"
},
{
"category": "external",
"summary": "2271718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718"
},
{
"category": "external",
"summary": "2271719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719"
},
{
"category": "external",
"summary": "2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "2282412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412"
},
{
"category": "external",
"summary": "2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "2312724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724"
},
{
"category": "external",
"summary": "2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "2314706",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706"
},
{
"category": "external",
"summary": "2323263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263"
},
{
"category": "external",
"summary": "2323278",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278"
},
{
"category": "external",
"summary": "2323289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289"
},
{
"category": "external",
"summary": "2327927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927"
},
{
"category": "external",
"summary": "2327931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931"
},
{
"category": "external",
"summary": "2333841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841"
},
{
"category": "external",
"summary": "2333843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843"
},
{
"category": "external",
"summary": "2333844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844"
},
{
"category": "external",
"summary": "2333845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845"
},
{
"category": "external",
"summary": "2333846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846"
},
{
"category": "external",
"summary": "2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "2344619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619"
},
{
"category": "external",
"summary": "2344621",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621"
},
{
"category": "external",
"summary": "2344622",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622"
},
{
"category": "external",
"summary": "2344623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623"
},
{
"category": "external",
"summary": "2344624",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624"
},
{
"category": "external",
"summary": "2344946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946"
},
{
"category": "external",
"summary": "2351802",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802"
},
{
"category": "external",
"summary": "2353871",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871"
},
{
"category": "external",
"summary": "2353872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872"
},
{
"category": "external",
"summary": "2357909",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909"
},
{
"category": "external",
"summary": "2357910",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910"
},
{
"category": "external",
"summary": "2357911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911"
},
{
"category": "external",
"summary": "2357913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913"
},
{
"category": "external",
"summary": "2357917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917"
},
{
"category": "external",
"summary": "2357918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918"
},
{
"category": "external",
"summary": "2357919",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919"
},
{
"category": "external",
"summary": "2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "2366499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499"
},
{
"category": "external",
"summary": "2366500",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500"
},
{
"category": "external",
"summary": "2366501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501"
},
{
"category": "external",
"summary": "2366502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502"
},
{
"category": "external",
"summary": "2366503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503"
},
{
"category": "external",
"summary": "2366504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json"
}
],
"title": "Red Hat Security Advisory: webkitgtk4 security update",
"tracking": {
"current_release_date": "2025-11-21T19:19:16+00:00",
"generator": {
"date": "2025-11-21T19:19:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:10364",
"initial_release_date": "2025-07-07T02:28:52+00:00",
"revision_history": [
{
"date": "2025-07-07T02:28:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-07T02:28:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T19:19:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch"
},
"product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch"
},
"product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
},
"product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-1745",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270151"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-1745"
},
{
"category": "external",
"summary": "RHBZ#2270151",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1745"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents"
},
{
"cve": "CVE-2020-9802",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879545"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9802"
},
{
"category": "external",
"summary": "RHBZ#1879545",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9802"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9803",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879557"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9803"
},
{
"category": "external",
"summary": "RHBZ#1879557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9805",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879559"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9805"
},
{
"category": "external",
"summary": "RHBZ#1879559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9805"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9806",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879563"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9806"
},
{
"category": "external",
"summary": "RHBZ#1879563",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9807",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879564"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9807"
},
{
"category": "external",
"summary": "RHBZ#1879564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9807"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9843",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879566"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Input validation issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9843"
},
{
"category": "external",
"summary": "RHBZ#1879566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Input validation issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9850",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879568"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9850"
},
{
"category": "external",
"summary": "RHBZ#1879568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9862",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879532"
}
],
"notes": [
{
"category": "description",
"text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Command injection in web inspector",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9862"
},
{
"category": "external",
"summary": "RHBZ#1879532",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9862"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Command injection in web inspector"
},
{
"cve": "CVE-2020-9893",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879535"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9893"
},
{
"category": "external",
"summary": "RHBZ#1879535",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9893"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9894",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879536"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9894"
},
{
"category": "external",
"summary": "RHBZ#1879536",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9894"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9895",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9895"
},
{
"category": "external",
"summary": "RHBZ#1879538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9895"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution"
},
{
"cve": "CVE-2020-9915",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879540"
}
],
"notes": [
{
"category": "description",
"text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Access issue in content security policy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9915"
},
{
"category": "external",
"summary": "RHBZ#1879540",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9915"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Access issue in content security policy"
},
{
"cve": "CVE-2020-9925",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879541"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A logic issue may lead to cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9925"
},
{
"category": "external",
"summary": "RHBZ#1879541",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9925"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0007.html",
"url": "https://webkitgtk.org/security/WSA-2020-0007.html"
}
],
"release_date": "2020-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A logic issue may lead to cross site scripting"
},
{
"cve": "CVE-2020-9947",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944331"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use after free issue may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9947"
},
{
"category": "external",
"summary": "RHBZ#1944331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9947"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use after free issue may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9948",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901214"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9948"
},
{
"category": "external",
"summary": "RHBZ#1901214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901216"
}
],
"notes": [
{
"category": "description",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9951"
},
{
"category": "external",
"summary": "RHBZ#1901216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-9952",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901219"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: input validation issue may lead to a cross site scripting",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9952"
},
{
"category": "external",
"summary": "RHBZ#1901219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: input validation issue may lead to a cross site scripting"
},
{
"cve": "CVE-2020-9983",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901221"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write may lead to code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-9983"
},
{
"category": "external",
"summary": "RHBZ#1901221",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write may lead to code execution"
},
{
"cve": "CVE-2020-13543",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-12-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1903568"
}
],
"notes": [
{
"category": "description",
"text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13543"
},
{
"category": "external",
"summary": "RHBZ#1903568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0009.html",
"url": "https://webkitgtk.org/security/WSA-2020-0009.html"
}
],
"release_date": "2020-11-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-13558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1928886"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13558"
},
{
"category": "external",
"summary": "RHBZ#1928886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0001.html",
"url": "https://webkitgtk.org/security/WSA-2021-0001.html"
}
],
"release_date": "2021-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution"
},
{
"cve": "CVE-2020-13584",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901212"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13584"
},
{
"category": "external",
"summary": "RHBZ#1901212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584"
}
],
"release_date": "2020-11-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2020-13753",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"discovery_date": "2020-09-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1879570"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13753"
},
{
"category": "external",
"summary": "RHBZ#1879570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13753"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2020-0006.html",
"url": "https://webkitgtk.org/security/WSA-2020-0006.html"
}
],
"release_date": "2020-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl"
},
{
"cve": "CVE-2020-27918",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944323"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27918"
},
{
"category": "external",
"summary": "RHBZ#1944323",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27918"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2020-29623",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944329"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: User may be unable to fully delete browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-29623"
},
{
"category": "external",
"summary": "RHBZ#1944329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29623"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: User may be unable to fully delete browsing history"
},
{
"cve": "CVE-2021-1765",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944333"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: IFrame sandboxing policy violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1765"
},
{
"category": "external",
"summary": "RHBZ#1944333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1765"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: IFrame sandboxing policy violation"
},
{
"cve": "CVE-2021-1788",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944859"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1788"
},
{
"category": "external",
"summary": "RHBZ#1944859",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1789",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944337"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1789"
},
{
"category": "external",
"summary": "RHBZ#1944337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-05-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1799",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944340"
}
],
"notes": [
{
"category": "description",
"text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1799"
},
{
"category": "external",
"summary": "RHBZ#1944340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection"
},
{
"cve": "CVE-2021-1801",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944343"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: IFrame sandboxing policy violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1801"
},
{
"category": "external",
"summary": "RHBZ#1944343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1801"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: IFrame sandboxing policy violation"
},
{
"cve": "CVE-2021-1817",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986852"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1817"
},
{
"category": "external",
"summary": "RHBZ#1986852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1820",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986856"
}
],
"notes": [
{
"category": "description",
"text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1820"
},
{
"category": "external",
"summary": "RHBZ#1986856",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure"
},
{
"cve": "CVE-2021-1825",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986858"
}
],
"notes": [
{
"category": "description",
"text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Input validation issue leading to cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1825"
},
{
"category": "external",
"summary": "RHBZ#1986858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Input validation issue leading to cross site scripting attack"
},
{
"cve": "CVE-2021-1826",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986860"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1826"
},
{
"category": "external",
"summary": "RHBZ#1986860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-1844",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944862"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1844"
},
{
"category": "external",
"summary": "RHBZ#1944862",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1844"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1870",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944350"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1870"
},
{
"category": "external",
"summary": "RHBZ#1944350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1870"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0002.html",
"url": "https://webkitgtk.org/security/WSA-2021-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-1871",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1944867"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-1871"
},
{
"category": "external",
"summary": "RHBZ#1944867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0003.html",
"url": "https://webkitgtk.org/security/WSA-2021-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-03-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-21775",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986863"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21775"
},
{
"category": "external",
"summary": "RHBZ#1986863",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution"
},
{
"cve": "CVE-2021-21779",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986866"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21779"
},
{
"category": "external",
"summary": "RHBZ#1986866",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution"
},
{
"cve": "CVE-2021-21806",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980441"
}
],
"notes": [
{
"category": "description",
"text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21806"
},
{
"category": "external",
"summary": "RHBZ#1980441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21806"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214"
}
],
"release_date": "2021-07-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30661",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986870"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30661"
},
{
"category": "external",
"summary": "RHBZ#1986870",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30663",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Integer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30663"
},
{
"category": "external",
"summary": "RHBZ#1986872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Integer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30665",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986874"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30665"
},
{
"category": "external",
"summary": "RHBZ#1986874",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30665"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30666",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986877"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30666"
},
{
"category": "external",
"summary": "RHBZ#1986877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30666"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30682",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986879"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to leak of sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30682"
},
{
"category": "external",
"summary": "RHBZ#1986879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30682"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to leak of sensitive user information"
},
{
"cve": "CVE-2021-30689",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986881"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30689"
},
{
"category": "external",
"summary": "RHBZ#1986881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-30720",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986883"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30720"
},
{
"category": "external",
"summary": "RHBZ#1986883",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers"
},
{
"cve": "CVE-2021-30734",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986886"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30734"
},
{
"category": "external",
"summary": "RHBZ#1986886",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30744",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986888"
}
],
"notes": [
{
"category": "description",
"text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30744"
},
{
"category": "external",
"summary": "RHBZ#1986888",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack"
},
{
"cve": "CVE-2021-30749",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986890"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30749"
},
{
"category": "external",
"summary": "RHBZ#1986890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30749"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30758",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986892"
}
],
"notes": [
{
"category": "description",
"text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30758"
},
{
"category": "external",
"summary": "RHBZ#1986892",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30758"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30761",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986894"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30761"
},
{
"category": "external",
"summary": "RHBZ#1986894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30761"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986898"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30762"
},
{
"category": "external",
"summary": "RHBZ#1986898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30762"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2021-11-03T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30795",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986900"
}
],
"notes": [
{
"category": "description",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30795"
},
{
"category": "external",
"summary": "RHBZ#1986900",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30797",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986902"
}
],
"notes": [
{
"category": "description",
"text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Insufficient checks leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30797"
},
{
"category": "external",
"summary": "RHBZ#1986902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30797"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Insufficient checks leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30799",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986906"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruptions leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30799"
},
{
"category": "external",
"summary": "RHBZ#1986906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0004.html",
"url": "https://webkitgtk.org/security/WSA-2021-0004.html"
}
],
"release_date": "2021-07-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruptions leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30809",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034347"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30809"
},
{
"category": "external",
"summary": "RHBZ#2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30818",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034368"
}
],
"notes": [
{
"category": "description",
"text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30818"
},
{
"category": "external",
"summary": "RHBZ#2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30823",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034373"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to HSTS bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30823"
},
{
"category": "external",
"summary": "RHBZ#2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to HSTS bypass"
},
{
"cve": "CVE-2021-30836",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034376"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30836"
},
{
"category": "external",
"summary": "RHBZ#2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: Out-of-bounds read leading to memory disclosure"
},
{
"cve": "CVE-2021-30846",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017898"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30846"
},
{
"category": "external",
"summary": "RHBZ#2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30846"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30848",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017901"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30848"
},
{
"category": "external",
"summary": "RHBZ#2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017904"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30849"
},
{
"category": "external",
"summary": "RHBZ#2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30851",
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018573"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30851"
},
{
"category": "external",
"summary": "RHBZ#2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30884",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30884"
},
{
"category": "external",
"summary": "RHBZ#2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history"
},
{
"cve": "CVE-2021-30887",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034381"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to Content Security Policy bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30887"
},
{
"category": "external",
"summary": "RHBZ#2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to Content Security Policy bypass"
},
{
"cve": "CVE-2021-30888",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034383"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Information leak via Content Security Policy reports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30888"
},
{
"category": "external",
"summary": "RHBZ#2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Information leak via Content Security Policy reports"
},
{
"cve": "CVE-2021-30889",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034386"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30889"
},
{
"category": "external",
"summary": "RHBZ#2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30889"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30890",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034389"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross-site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30890"
},
{
"category": "external",
"summary": "RHBZ#2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross-site scripting"
},
{
"cve": "CVE-2021-30897",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2038907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin data exfiltration via resource timing API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30897"
},
{
"category": "external",
"summary": "RHBZ#2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin data exfiltration via resource timing API"
},
{
"cve": "CVE-2021-30934",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044521"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "RHBZ#2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30936",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044528"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "RHBZ#2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044534"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "RHBZ#2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30952",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "RHBZ#2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30953",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044542"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "RHBZ#2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30954",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044551"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "RHBZ#2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30984",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044553"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "RHBZ#2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-42762",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-10-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016673"
}
],
"notes": [
{
"category": "description",
"text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: limited sandbox escape via VFS syscalls",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42762"
},
{
"category": "external",
"summary": "RHBZ#2016673",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42762"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762"
}
],
"release_date": "2021-10-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: limited sandbox escape via VFS syscalls"
},
{
"cve": "CVE-2021-45481",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040327"
}
],
"notes": [
{
"category": "description",
"text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "RHBZ#2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create"
},
{
"cve": "CVE-2021-45482",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040329"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "RHBZ#2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild"
},
{
"cve": "CVE-2021-45483",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040331"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::Frame::page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "RHBZ#2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45483"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::Frame::page"
},
{
"cve": "CVE-2022-0108",
"discovery_date": "2022-01-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037469"
}
],
"notes": [
{
"category": "description",
"text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Inappropriate implementation in Navigation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0108"
},
{
"category": "external",
"summary": "RHBZ#2037469",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108"
}
],
"release_date": "2022-01-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "chromium-browser: Inappropriate implementation in Navigation"
},
{
"cve": "CVE-2022-22589",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "RHBZ#2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22589"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript"
},
{
"cve": "CVE-2022-22590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053181"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "RHBZ#2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-22592",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053185"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "RHBZ#2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2022-22594",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2045291"
}
],
"notes": [
{
"category": "description",
"text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22594"
},
{
"category": "external",
"summary": "RHBZ#2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2022-22620",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056474"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "RHBZ#2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0003.html",
"url": "https://webkitgtk.org/security/WSA-2022-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-02-11T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free"
},
{
"cve": "CVE-2022-22624",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073893"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22624"
},
{
"category": "external",
"summary": "RHBZ#2073893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22624"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22628",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073896"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22628"
},
{
"category": "external",
"summary": "RHBZ#2073896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22628"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22629",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073899"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22629"
},
{
"category": "external",
"summary": "RHBZ#2073899",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22629"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2022-22637",
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073903"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue was addressed with improved state management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22637"
},
{
"category": "external",
"summary": "RHBZ#2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue was addressed with improved state management"
},
{
"cve": "CVE-2022-22662",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104787"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22662"
},
{
"category": "external",
"summary": "RHBZ#2104787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure"
},
{
"cve": "CVE-2022-22677",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104788"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22677"
},
{
"category": "external",
"summary": "RHBZ#2104788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22677"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted"
},
{
"cve": "CVE-2022-26700",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092732"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26700"
},
{
"category": "external",
"summary": "RHBZ#2092732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092733"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26709"
},
{
"category": "external",
"summary": "RHBZ#2092733",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26710",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2104789"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26710"
},
{
"category": "external",
"summary": "RHBZ#2104789",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26710"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0006.html",
"url": "https://webkitgtk.org/security/WSA-2022-0006.html"
}
],
"release_date": "2022-07-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26716",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092734"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26716"
},
{
"category": "external",
"summary": "RHBZ#2092734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26717",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092735"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26717"
},
{
"category": "external",
"summary": "RHBZ#2092735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26717"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2022-26719",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-06-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2092736"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-26719"
},
{
"category": "external",
"summary": "RHBZ#2092736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0005.html",
"url": "https://webkitgtk.org/security/WSA-2022-0005.html"
}
],
"release_date": "2022-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30293",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082548"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30293"
},
{
"category": "external",
"summary": "RHBZ#2082548",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30293"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution"
},
{
"cve": "CVE-2022-30294",
"discovery_date": "2022-05-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2082544"
}
],
"notes": [
{
"category": "description",
"text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30294"
},
{
"category": "external",
"summary": "RHBZ#2082544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30294"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294"
}
],
"release_date": "2022-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer"
},
{
"cve": "CVE-2022-32792",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238973"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32792"
},
{
"category": "external",
"summary": "RHBZ#2238973",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32792"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32816",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238975"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: malicious content may lead to UI spoofing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32816"
},
{
"category": "external",
"summary": "RHBZ#2238975",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2022-0007.html",
"url": "https://wpewebkit.org/security/WSA-2022-0007.html"
}
],
"release_date": "2022-07-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: malicious content may lead to UI spoofing"
},
{
"cve": "CVE-2022-32885",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236842"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue when processing web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32885"
},
{
"category": "external",
"summary": "RHBZ#2236842",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32885"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue when processing web content"
},
{
"cve": "CVE-2022-32886",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128643"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: buffer overflow issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32886"
},
{
"category": "external",
"summary": "RHBZ#2128643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: buffer overflow issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-32888",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140501"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32888"
},
{
"category": "external",
"summary": "RHBZ#2140501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32891",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128647"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32891"
},
{
"category": "external",
"summary": "RHBZ#2128647",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content"
},
{
"cve": "CVE-2022-32893",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2121645"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32893"
},
{
"category": "external",
"summary": "RHBZ#2121645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32893"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0008.html",
"url": "https://webkitgtk.org/security/WSA-2022-0008.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-08-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-08-18T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-32912",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-09-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2128645"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32912"
},
{
"category": "external",
"summary": "RHBZ#2128645",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0009.html",
"url": "https://webkitgtk.org/security/WSA-2022-0009.html"
}
],
"release_date": "2022-09-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2022-32919",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271437"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32919"
},
{
"category": "external",
"summary": "RHBZ#2271437",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32919"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing."
},
{
"cve": "CVE-2022-32923",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140502"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: correctness issue in the JIT was addressed with improved checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32923"
},
{
"category": "external",
"summary": "RHBZ#2140502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: correctness issue in the JIT was addressed with improved checks"
},
{
"cve": "CVE-2022-32933",
"cwe": {
"id": "CWE-841",
"name": "Improper Enforcement of Behavioral Workflow"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271441"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A website may able to track visited websites in private browsing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-32933"
},
{
"category": "external",
"summary": "RHBZ#2271441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32933"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A website may able to track visited websites in private browsing"
},
{
"cve": "CVE-2022-42799",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140503"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: issue was addressed with improved UI handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42799"
},
{
"category": "external",
"summary": "RHBZ#2140503",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: issue was addressed with improved UI handling"
},
{
"cve": "CVE-2022-42823",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140505"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42823"
},
{
"category": "external",
"summary": "RHBZ#2140505",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42824",
"discovery_date": "2022-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2140504"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: sensitive information disclosure issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42824"
},
{
"category": "external",
"summary": "RHBZ#2140504",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0010.html",
"url": "https://webkitgtk.org/security/WSA-2022-0010.html"
}
],
"release_date": "2022-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: sensitive information disclosure issue"
},
{
"cve": "CVE-2022-42826",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167716"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42826"
},
{
"category": "external",
"summary": "RHBZ#2167716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42826"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42852",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory disclosure issue was addressed with improved memory handling",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42852"
},
{
"category": "external",
"summary": "RHBZ#2156986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory disclosure issue was addressed with improved memory handling"
},
{
"cve": "CVE-2022-42856",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-12-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153683"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42856"
},
{
"category": "external",
"summary": "RHBZ#2153683",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-12-14T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution"
},
{
"cve": "CVE-2022-42863",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156987"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42863"
},
{
"category": "external",
"summary": "RHBZ#2156987",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-42867",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156989"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-42867"
},
{
"category": "external",
"summary": "RHBZ#2156989",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46691",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156990"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46691"
},
{
"category": "external",
"summary": "RHBZ#2156990",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46691"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46692",
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156991"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass issue",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46692"
},
{
"category": "external",
"summary": "RHBZ#2156991",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46692"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass issue"
},
{
"cve": "CVE-2022-46698",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156992"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue leading to user information disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46698"
},
{
"category": "external",
"summary": "RHBZ#2156992",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46698"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue leading to user information disclosure"
},
{
"cve": "CVE-2022-46699",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156993"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46699"
},
{
"category": "external",
"summary": "RHBZ#2156993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46700",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2156994"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46700"
},
{
"category": "external",
"summary": "RHBZ#2156994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46700"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0011.html",
"url": "https://webkitgtk.org/security/WSA-2022-0011.html"
}
],
"release_date": "2022-12-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2022-46705",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271444"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46705"
},
{
"category": "external",
"summary": "RHBZ#2271444",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2022-46725",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271446"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-46725"
},
{
"category": "external",
"summary": "RHBZ#2271446",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing."
},
{
"cve": "CVE-2022-48503",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218623"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: improper bounds checking leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality..\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48503"
},
{
"category": "external",
"summary": "RHBZ#2218623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48503"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-10-20T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: improper bounds checking leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23517",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167717"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23517"
},
{
"category": "external",
"summary": "RHBZ#2167717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23518",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2167715"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23518"
},
{
"category": "external",
"summary": "RHBZ#2167715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23518"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0001.html",
"url": "https://webkitgtk.org/security/WSA-2023-0001.html"
}
],
"release_date": "2023-02-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-23529",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-02-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2169934"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-23529"
},
{
"category": "external",
"summary": "RHBZ#2169934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23529"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0002.html",
"url": "https://webkitgtk.org/security/WSA-2023-0002.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-02-14T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution"
},
{
"cve": "CVE-2023-25358",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2175099"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25358"
},
{
"category": "external",
"summary": "RHBZ#2175099",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358"
},
{
"category": "external",
"summary": "https://bugs.webkit.org/show_bug.cgi?id=242683",
"url": "https://bugs.webkit.org/show_bug.cgi?id=242683"
}
],
"release_date": "2022-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()"
},
{
"cve": "CVE-2023-27932",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236843"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Same Origin Policy bypass via crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27932"
},
{
"category": "external",
"summary": "RHBZ#2236843",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27932"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Same Origin Policy bypass via crafted web content"
},
{
"cve": "CVE-2023-27954",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-09-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2236844"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Website may be able to track sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27954"
},
{
"category": "external",
"summary": "RHBZ#2236844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0003.html",
"url": "https://webkitgtk.org/security/WSA-2023-0003.html"
}
],
"release_date": "2023-04-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Website may be able to track sensitive user information"
},
{
"cve": "CVE-2023-28198",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238943"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use after free vulnerability",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28198"
},
{
"category": "external",
"summary": "RHBZ#2238943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0008.html",
"url": "https://webkitgtk.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use after free vulnerability"
},
{
"cve": "CVE-2023-28204",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209208"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: an out-of-bounds read when processing malicious content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28204"
},
{
"category": "external",
"summary": "RHBZ#2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: an out-of-bounds read when processing malicious content"
},
{
"cve": "CVE-2023-28205",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2185724"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "WebKitGTK: use-after-free leads to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28205"
},
{
"category": "external",
"summary": "RHBZ#2185724",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28205"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv",
"url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-04-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-04-10T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "WebKitGTK: use-after-free leads to arbitrary code execution"
},
{
"cve": "CVE-2023-32359",
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271449"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32359"
},
{
"category": "external",
"summary": "RHBZ#2271449",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32359"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature"
},
{
"cve": "CVE-2023-32370",
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238944"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: content security policy blacklist failure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32370"
},
{
"category": "external",
"summary": "RHBZ#2238944",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0008.html",
"url": "https://webkitgtk.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: content security policy blacklist failure"
},
{
"cve": "CVE-2023-32373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209214"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: a use-after-free when processing maliciously crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32373"
},
{
"category": "external",
"summary": "RHBZ#2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: a use-after-free when processing maliciously crafted web content"
},
{
"cve": "CVE-2023-32393",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2224608"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32393"
},
{
"category": "external",
"summary": "RHBZ#2224608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32393"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0006.html",
"url": "https://webkitgtk.org/security/WSA-2023-0006.html"
}
],
"release_date": "2023-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-32435",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218626"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32435"
},
{
"category": "external",
"summary": "RHBZ#2218626",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0005.html",
"url": "https://webkitgtk.org/security/WSA-2023-0005.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-06-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-32439",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218640"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32439"
},
{
"category": "external",
"summary": "RHBZ#2218640",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32439"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0005.html",
"url": "https://webkitgtk.org/security/WSA-2023-0005.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-06-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-06-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2023-35074",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241403"
}
],
"notes": [
{
"category": "description",
"text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-35074"
},
{
"category": "external",
"summary": "RHBZ#2241403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-37450",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2023-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2223000"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-37450"
},
{
"category": "external",
"summary": "RHBZ#2223000",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-07-13T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38133",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231015"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: disclose sensitive information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38133"
},
{
"category": "external",
"summary": "RHBZ#2231015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38133"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: disclose sensitive information"
},
{
"cve": "CVE-2023-38572",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: bypass Same Origin Policy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38572"
},
{
"category": "external",
"summary": "RHBZ#2231028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38572"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: bypass Same Origin Policy"
},
{
"cve": "CVE-2023-38592",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231017"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38592"
},
{
"category": "external",
"summary": "RHBZ#2231017",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-38594",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231018"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38594"
},
{
"category": "external",
"summary": "RHBZ#2231018",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38595",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231019"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38595"
},
{
"category": "external",
"summary": "RHBZ#2231019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38595"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38597",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231043"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38597"
},
{
"category": "external",
"summary": "RHBZ#2231043",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38597"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38599",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231020"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: track sensitive user information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38599"
},
{
"category": "external",
"summary": "RHBZ#2231020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: track sensitive user information"
},
{
"cve": "CVE-2023-38600",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231021"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38600"
},
{
"category": "external",
"summary": "RHBZ#2231021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38600"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-38611",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2231022"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-38611"
},
{
"category": "external",
"summary": "RHBZ#2231022",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38611"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0007.html",
"url": "https://webkitgtk.org/security/WSA-2023-0007.html"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: arbitrary code execution"
},
{
"cve": "CVE-2023-39928",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241400"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39928"
},
{
"category": "external",
"summary": "RHBZ#2241400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39928"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0009.html",
"url": "https://webkitgtk.org/security/WSA-2023-0009.html"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports"
},
{
"cve": "CVE-2023-40397",
"cwe": {
"id": "CWE-96",
"name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)"
},
"discovery_date": "2023-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2238945"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: arbitrary javascript code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40397"
},
{
"category": "external",
"summary": "RHBZ#2238945",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40397"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397"
},
{
"category": "external",
"summary": "https://wpewebkit.org/security/WSA-2023-0008.html",
"url": "https://wpewebkit.org/security/WSA-2023-0008.html"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: arbitrary javascript code execution"
},
{
"cve": "CVE-2023-40414",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270143"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40414"
},
{
"category": "external",
"summary": "RHBZ#2270143",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-40451",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241409"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-40451"
},
{
"category": "external",
"summary": "RHBZ#2241409",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40451"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0009.html",
"url": "https://webkitgtk.org/security/WSA-2023-0009.html"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code"
},
{
"cve": "CVE-2023-41074",
"discovery_date": "2023-09-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241412"
}
],
"notes": [
{
"category": "description",
"text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41074"
},
{
"category": "external",
"summary": "RHBZ#2241412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41074"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074"
}
],
"release_date": "2023-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-41983",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271453"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41983"
},
{
"category": "external",
"summary": "RHBZ#2271453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41983"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing web content may lead to a denial of service"
},
{
"cve": "CVE-2023-41993",
"discovery_date": "2023-09-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2240522"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing malicious web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41993"
},
{
"category": "external",
"summary": "RHBZ#2240522",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41993"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-09-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-09-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing malicious web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42833",
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270146"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42833"
},
{
"category": "external",
"summary": "RHBZ#2270146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42843",
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271717"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: visiting a malicious website may lead to address bar spoofing",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42843"
},
{
"category": "external",
"summary": "RHBZ#2271717",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: visiting a malicious website may lead to address bar spoofing"
},
{
"cve": "CVE-2023-42852",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271456"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42852"
},
{
"category": "external",
"summary": "RHBZ#2271456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42852"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0010.html",
"url": "https://webkitgtk.org/security/WSA-2023-0010.html"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42875",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T12:59:19.828000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366497"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42875"
},
{
"category": "external",
"summary": "RHBZ#2366497",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42883",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254326"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing a malicious image may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42883"
},
{
"category": "external",
"summary": "RHBZ#2254326",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42883"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883"
}
],
"release_date": "2023-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing a malicious image may lead to a denial of service"
},
{
"cve": "CVE-2023-42890",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254327"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: processing malicious web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42890"
},
{
"category": "external",
"summary": "RHBZ#2254327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890"
}
],
"release_date": "2023-12-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: processing malicious web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42916",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253054"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leads to sensitive data leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42916"
},
{
"category": "external",
"summary": "RHBZ#2253054",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42916"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Out-of-bounds read leads to sensitive data leak"
},
{
"cve": "CVE-2023-42917",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253058"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Arbitrary Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42917"
},
{
"category": "external",
"summary": "RHBZ#2253058",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42917"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2023-0011.html",
"url": "https://webkitgtk.org/security/WSA-2023-0011.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-12-04T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Arbitrary Remote Code Execution"
},
{
"cve": "CVE-2023-42950",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271718"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: heap use-after-free may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42950"
},
{
"category": "external",
"summary": "RHBZ#2271718",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42950"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: heap use-after-free may lead to arbitrary code execution"
},
{
"cve": "CVE-2023-42956",
"discovery_date": "2024-03-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271719"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content may lead to a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42956"
},
{
"category": "external",
"summary": "RHBZ#2271719",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0002.html",
"url": "https://webkitgtk.org/security/WSA-2024-0002.html"
}
],
"release_date": "2024-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content may lead to a denial of service"
},
{
"cve": "CVE-2023-42970",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-05-15T13:01:32.590000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366498"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42970"
},
{
"category": "external",
"summary": "RHBZ#2366498",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0004.html",
"url": "https://webkitgtk.org/security/WSA-2025-0004.html"
}
],
"release_date": "2025-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-4558",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2279689"
}
],
"notes": [
{
"category": "description",
"text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "chromium-browser: Use after free in ANGLE",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-4558"
},
{
"category": "external",
"summary": "RHBZ#2279689",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558"
}
],
"release_date": "2024-05-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "chromium-browser: Use after free in ANGLE"
},
{
"cve": "CVE-2024-23213",
"discovery_date": "2024-03-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270141"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23213"
},
{
"category": "external",
"summary": "RHBZ#2270141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23213"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
}
],
"release_date": "2024-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-23222",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2024-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2259893"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: type confusion may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23222"
},
{
"category": "external",
"summary": "RHBZ#2259893",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23222"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0001.html",
"url": "https://webkitgtk.org/security/WSA-2024-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2024-01-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2024-01-23T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: type confusion may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-23252",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270288"
}
],
"notes": [
{
"category": "description",
"text": "No description is available for this CVE.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content may lead to denial-of-service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE has been marked as Rejected by the assigning CNA.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23252"
},
{
"category": "external",
"summary": "RHBZ#2270288",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23252"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"title": "webkit: processing malicious web content may lead to denial-of-service"
},
{
"cve": "CVE-2024-23254",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270289"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: malicious website may exfiltrate audio data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23254"
},
{
"category": "external",
"summary": "RHBZ#2270289",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: malicious website may exfiltrate audio data cross-origin"
},
{
"cve": "CVE-2024-23263",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270290"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing malicious web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23263"
},
{
"category": "external",
"summary": "RHBZ#2270290",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23263"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing malicious web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-23271",
"cwe": {
"id": "CWE-942",
"name": "Permissive Cross-domain Security Policy with Untrusted Domains"
},
"discovery_date": "2024-09-25T15:33:21.499000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314696"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23271"
},
{
"category": "external",
"summary": "RHBZ#2314696",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior"
},
{
"cve": "CVE-2024-23280",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270291"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23280"
},
{
"category": "external",
"summary": "RHBZ#2270291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23280"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-23284",
"discovery_date": "2024-03-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2270292"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23284"
},
{
"category": "external",
"summary": "RHBZ#2270292",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2024/Mar/21",
"url": "https://seclists.org/fulldisclosure/2024/Mar/21"
}
],
"release_date": "2024-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced"
},
{
"cve": "CVE-2024-27808",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:36:18.356000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314697"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27808"
},
{
"category": "external",
"summary": "RHBZ#2314697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27808"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27820",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:37:48.081000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314698"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27820"
},
{
"category": "external",
"summary": "RHBZ#2314698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27833",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:40:34.042000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314700"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27833"
},
{
"category": "external",
"summary": "RHBZ#2314700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27833"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27834",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282412"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkit: pointer authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27834"
},
{
"category": "external",
"summary": "RHBZ#2282412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27834"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0003.html",
"url": "https://webkitgtk.org/security/WSA-2024-0003.html"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkit: pointer authentication bypass"
},
{
"cve": "CVE-2024-27838",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2024-09-25T15:42:35.706000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314702"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27838"
},
{
"category": "external",
"summary": "RHBZ#2314702",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27838"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user"
},
{
"cve": "CVE-2024-27851",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-09-25T15:44:41.235000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2314704"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27851"
},
{
"category": "external",
"summary": "RHBZ#2314704",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0005.html",
"url": "https://webkitgtk.org/security/WSA-2024-0005.html"
}
],
"release_date": "2024-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2024-27856",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"discovery_date": "2025-02-10T09:34:34.705418+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344618"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27856"
},
{
"category": "external",
"summary": "RHBZ#2344618",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27856"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120896",
"url": "https://support.apple.com/en-us/120896"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120898",
"url": "https://support.apple.com/en-us/120898"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120901",
"url": "https://support.apple.com/en-us/120901"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120902",
"url": "https://support.apple.com/en-us/120902"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120903",
"url": "https://support.apple.com/en-us/120903"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120905",
"url": "https://support.apple.com/en-us/120905"
},
{
"category": "external",
"summary": "https://support.apple.com/en-us/120906",
"url": "https://support.apple.com/en-us/120906"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2025-0001.html",
"url": "https://webkitgtk.org/security/WSA-2025-0001.html"
}
],
"release_date": "2025-01-15T19:35:57.075000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution"
},
{
"cve": "CVE-2024-40776",
"discovery_date": "2024-07-30T20:48:03+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2301841"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40776"
},
{
"category": "external",
"summary": "RHBZ#2301841",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html"
}
],
"release_date": "2024-07-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution"
},
{
"cve": "CVE-2024-40779",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:05:50+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302070"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40779"
},
{
"category": "external",
"summary": "RHBZ#2302070",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40779"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40780",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:07:22+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302069"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40780"
},
{
"category": "external",
"summary": "RHBZ#2302069",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking"
},
{
"cve": "CVE-2024-40782",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-07-31T14:57:24+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302071"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40782"
},
{
"category": "external",
"summary": "RHBZ#2302071",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40782"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management"
},
{
"cve": "CVE-2024-40789",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-07-31T15:39:05+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2302067"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-40789"
},
{
"category": "external",
"summary": "RHBZ#2302067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40789"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789",
"url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789"
}
],
"release_date": "2024-07-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-07T02:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10364"
},
{
"category": "workaround",
"details": "Do not process or load untrusted web content with WebKitGTK.",
"product_ids": [
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src",
"7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x",
"7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired