Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-28204 (GCVE-0-2023-28204)
Vulnerability from cvelistv5 – Published: 2023-06-23 00:00 – Updated: 2025-10-21 23:05- Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.
| Vendor | Product | Version | |
|---|---|---|---|
| Apple | macOS |
Affected:
unspecified , < 13.4
(custom)
|
|
| Apple | Safari |
Affected:
unspecified , < 16.5
(custom)
|
|
| Apple | watchOS |
Affected:
unspecified , < 9.5
(custom)
|
|
| Apple | iOS and iPadOS |
Affected:
unspecified , < 15.7
(custom)
|
|
| Apple | iOS and iPadOS |
Affected:
unspecified , < 16.5
(custom)
|
|
| Apple | tvOS |
Affected:
unspecified , < 16.5
(custom)
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-125 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | Multiple Products |
| Due Date | 2023-06-12 |
| Date Added | 2023-05-22 |
| Vendorproject | Apple |
| Vulnerabilityname | Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T12:30:24.554Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213758"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213762"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213764"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213765"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213757"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT213761"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202401-04"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-28204",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-04T15:11:51.441262Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-05-22",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:05:45.355Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-05-22T00:00:00.000Z",
"value": "CVE-2023-28204 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "13.4",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Safari",
"vendor": "Apple",
"versions": [
{
"lessThan": "16.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "9.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.7",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "16.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "tvOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "16.5",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-05T14:06:47.264Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"url": "https://support.apple.com/en-us/HT213758"
},
{
"url": "https://support.apple.com/en-us/HT213762"
},
{
"url": "https://support.apple.com/en-us/HT213764"
},
{
"url": "https://support.apple.com/en-us/HT213765"
},
{
"url": "https://support.apple.com/en-us/HT213757"
},
{
"url": "https://support.apple.com/en-us/HT213761"
},
{
"url": "https://security.gentoo.org/glsa/202401-04"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2023-28204",
"datePublished": "2023-06-23T00:00:00.000Z",
"dateReserved": "2023-03-13T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:05:45.355Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-28204",
"cwes": "[\"CWE-125\"]",
"dateAdded": "2023-05-22",
"dueDate": "2023-06-12",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://support.apple.com/HT213757, https://support.apple.com/HT213758, https://support.apple.com/HT213761, https://support.apple.com/HT213762, https://support.apple.com/HT213764, https://support.apple.com/HT213765; https://nvd.nist.gov/vuln/detail/CVE-2023-28204",
"product": "Multiple Products",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "Apple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.",
"vendorProject": "Apple",
"vulnerabilityName": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability"
},
"epss": {
"cve": "CVE-2023-28204",
"date": "2026-05-20",
"epss": "0.00077",
"percentile": "0.22723"
},
"fkie_nvd": {
"cisaActionDue": "2023-06-12",
"cisaExploitAdd": "2023-05-22",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"16.5\", \"matchCriteriaId\": \"21B2F081-D602-4C84-8343-6327B23176D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.7.6\", \"matchCriteriaId\": \"4EC9E481-57D3-4F4D-A8D2-7DA0272F0706\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.0\", \"versionEndExcluding\": \"16.5\", \"matchCriteriaId\": \"830FA87A-4E89-4E04-A8AF-A1FF08D77B2E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.7.6\", \"matchCriteriaId\": \"8B89F737-4ADD-424C-A946-F368A7ABBE6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.0\", \"versionEndExcluding\": \"16.5\", \"matchCriteriaId\": \"424F077B-6678-4CE3-A216-C98E6D48F8AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"13.0\", \"versionEndExcluding\": \"13.4\", \"matchCriteriaId\": \"DA07361B-D827-471F-9443-4BE4265D6A3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"16.5\", \"matchCriteriaId\": \"D36613A6-BD83-4A57-8EE1-C186EB69DFF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.5\", \"matchCriteriaId\": \"BE5DB973-7B51-4232-8E1D-231078FE275C\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:webkitgtk:webkitgtk\\\\+:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.42.3\", \"matchCriteriaId\": \"8C7F88F0-0092-4338-A52F-1A2ED27460B5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.\"}]",
"id": "CVE-2023-28204",
"lastModified": "2024-11-21T07:54:35.760",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2023-06-23T18:15:11.333",
"references": "[{\"url\": \"https://security.gentoo.org/glsa/202401-04\", \"source\": \"product-security@apple.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213757\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213758\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213761\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213762\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213764\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213765\", \"source\": \"product-security@apple.com\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202401-04\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213757\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213758\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213761\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213762\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213764\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/en-us/HT213765\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-28204\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2023-06-23T18:15:11.333\",\"lastModified\":\"2025-10-23T18:48:24.987\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"cisaExploitAdd\":\"2023-05-22\",\"cisaActionDue\":\"2023-06-12\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.5\",\"matchCriteriaId\":\"21B2F081-D602-4C84-8343-6327B23176D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.7.6\",\"matchCriteriaId\":\"4EC9E481-57D3-4F4D-A8D2-7DA0272F0706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"16.5\",\"matchCriteriaId\":\"830FA87A-4E89-4E04-A8AF-A1FF08D77B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.7.6\",\"matchCriteriaId\":\"8B89F737-4ADD-424C-A946-F368A7ABBE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"16.5\",\"matchCriteriaId\":\"424F077B-6678-4CE3-A216-C98E6D48F8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13.0\",\"versionEndExcluding\":\"13.4\",\"matchCriteriaId\":\"DA07361B-D827-471F-9443-4BE4265D6A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.5\",\"matchCriteriaId\":\"D36613A6-BD83-4A57-8EE1-C186EB69DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.5\",\"matchCriteriaId\":\"BE5DB973-7B51-4232-8E1D-231078FE275C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webkitgtk:webkitgtk\\\\+:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.42.3\",\"matchCriteriaId\":\"8C7F88F0-0092-4338-A52F-1A2ED27460B5\"}]}]}],\"references\":[{\"url\":\"https://security.gentoo.org/glsa/202401-04\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213757\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213758\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213761\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213762\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213764\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213765\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202401-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213757\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213761\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213762\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213764\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213765\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213758\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213762\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213764\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213765\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213757\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://support.apple.com/en-us/HT213761\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.gentoo.org/glsa/202401-04\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T12:30:24.554Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-28204\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-04T15:11:51.441262Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-05-22\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-05-22T00:00:00.000Z\", \"value\": \"CVE-2023-28204 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125 Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-03T13:57:48.287Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"13.4\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"Safari\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"16.5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"watchOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"9.5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"16.5\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"tvOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"16.5\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/HT213758\"}, {\"url\": \"https://support.apple.com/en-us/HT213762\"}, {\"url\": \"https://support.apple.com/en-us/HT213764\"}, {\"url\": \"https://support.apple.com/en-us/HT213765\"}, {\"url\": \"https://support.apple.com/en-us/HT213757\"}, {\"url\": \"https://support.apple.com/en-us/HT213761\"}, {\"url\": \"https://security.gentoo.org/glsa/202401-04\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2024-01-05T14:06:47.264Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-28204\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:05:45.355Z\", \"dateReserved\": \"2023-03-13T00:00:00.000Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2023-06-23T00:00:00.000Z\", \"assignerShortName\": \"apple\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2023-AVI-0390
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | macOS | Apple macOS Big Sur versions antérieures à 11.7.7 | ||
| Apple | Safari | Apple Safari versions antérieures à 16.5 | ||
| Apple | N/A | Apple iOS versions antérieures à 16.5 | ||
| Apple | N/A | Apple iPadOS versions antérieures à 16.5 | ||
| Apple | N/A | Apple iPadOS versions antérieures à 15.7.6 | ||
| Apple | N/A | Apple iOS versions antérieures à 15.7.6 | ||
| Apple | macOS | Apple macOS Ventura versions antérieures à 13.4 | ||
| Apple | macOS | Apple macOS Monterey versions antérieures à 12.6.6 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple macOS Big Sur versions ant\u00e9rieures \u00e0 11.7.7",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Safari versions ant\u00e9rieures \u00e0 16.5",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions ant\u00e9rieures \u00e0 16.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iPadOS versions ant\u00e9rieures \u00e0 16.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iPadOS versions ant\u00e9rieures \u00e0 15.7.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions ant\u00e9rieures \u00e0 15.7.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple macOS Ventura versions ant\u00e9rieures \u00e0 13.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple macOS Monterey versions ant\u00e9rieures \u00e0 12.6.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-32389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32389"
},
{
"name": "CVE-2023-32407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32407"
},
{
"name": "CVE-2023-32388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32388"
},
{
"name": "CVE-2023-32368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32368"
},
{
"name": "CVE-2023-32375",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32375"
},
{
"name": "CVE-2023-32373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32373"
},
{
"name": "CVE-2023-32402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32402"
},
{
"name": "CVE-2023-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32399"
},
{
"name": "CVE-2023-32410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32410"
},
{
"name": "CVE-2023-32382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32382"
},
{
"name": "CVE-2023-32411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32411"
},
{
"name": "CVE-2023-32371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32371"
},
{
"name": "CVE-2023-32413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32413"
},
{
"name": "CVE-2023-32357",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32357"
},
{
"name": "CVE-2023-32398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32398"
},
{
"name": "CVE-2023-32395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32395"
},
{
"name": "CVE-2023-32390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32390"
},
{
"name": "CVE-2023-23532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23532"
},
{
"name": "CVE-2023-32391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32391"
},
{
"name": "CVE-2023-32412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32412"
},
{
"name": "CVE-2023-32376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32376"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-32394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32394"
},
{
"name": "CVE-2023-32372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32372"
},
{
"name": "CVE-2023-32408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32408"
},
{
"name": "CVE-2023-23535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23535"
},
{
"name": "CVE-2023-32367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32367"
},
{
"name": "CVE-2023-27930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27930"
},
{
"name": "CVE-2023-32385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32385"
},
{
"name": "CVE-2023-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32414"
},
{
"name": "CVE-2023-32392",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32392"
},
{
"name": "CVE-2023-32409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32409"
},
{
"name": "CVE-2023-32405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32405"
},
{
"name": "CVE-2023-32423",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32423"
},
{
"name": "CVE-2023-32419",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32419"
},
{
"name": "CVE-2023-27945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27945"
},
{
"name": "CVE-2023-32384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32384"
},
{
"name": "CVE-2023-32369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32369"
},
{
"name": "CVE-2023-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32415"
},
{
"name": "CVE-2023-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32387"
},
{
"name": "CVE-2023-32397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32397"
},
{
"name": "CVE-2023-32354",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32354"
},
{
"name": "CVE-2023-32420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32420"
},
{
"name": "CVE-2023-32380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32380"
},
{
"name": "CVE-2023-32355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32355"
},
{
"name": "CVE-2023-32365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32365"
},
{
"name": "CVE-2023-27940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27940"
},
{
"name": "CVE-2023-32352",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32352"
},
{
"name": "CVE-2023-32422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32422"
},
{
"name": "CVE-2023-32363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32363"
},
{
"name": "CVE-2023-28204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28204"
},
{
"name": "CVE-2023-28202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28202"
},
{
"name": "CVE-2023-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32386"
},
{
"name": "CVE-2023-28181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28181"
},
{
"name": "CVE-2023-32404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32404"
},
{
"name": "CVE-2023-32403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32403"
},
{
"name": "CVE-2023-32400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32400"
},
{
"name": "CVE-2023-28191",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28191"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0390",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eApple\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, un d\u00e9ni de service et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213757 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213757"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213758 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213758"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213760 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213760"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213762 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213762"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213759 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213759"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213765 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213765"
}
]
}
CERTFR-2023-AVI-0390
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données, une exécution de code arbitraire à distance, une atteinte à l'intégrité des données, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | macOS | Apple macOS Big Sur versions antérieures à 11.7.7 | ||
| Apple | Safari | Apple Safari versions antérieures à 16.5 | ||
| Apple | N/A | Apple iOS versions antérieures à 16.5 | ||
| Apple | N/A | Apple iPadOS versions antérieures à 16.5 | ||
| Apple | N/A | Apple iPadOS versions antérieures à 15.7.6 | ||
| Apple | N/A | Apple iOS versions antérieures à 15.7.6 | ||
| Apple | macOS | Apple macOS Ventura versions antérieures à 13.4 | ||
| Apple | macOS | Apple macOS Monterey versions antérieures à 12.6.6 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple macOS Big Sur versions ant\u00e9rieures \u00e0 11.7.7",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Safari versions ant\u00e9rieures \u00e0 16.5",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions ant\u00e9rieures \u00e0 16.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iPadOS versions ant\u00e9rieures \u00e0 16.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iPadOS versions ant\u00e9rieures \u00e0 15.7.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions ant\u00e9rieures \u00e0 15.7.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple macOS Ventura versions ant\u00e9rieures \u00e0 13.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple macOS Monterey versions ant\u00e9rieures \u00e0 12.6.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-32389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32389"
},
{
"name": "CVE-2023-32407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32407"
},
{
"name": "CVE-2023-32388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32388"
},
{
"name": "CVE-2023-32368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32368"
},
{
"name": "CVE-2023-32375",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32375"
},
{
"name": "CVE-2023-32373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32373"
},
{
"name": "CVE-2023-32402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32402"
},
{
"name": "CVE-2023-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32399"
},
{
"name": "CVE-2023-32410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32410"
},
{
"name": "CVE-2023-32382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32382"
},
{
"name": "CVE-2023-32411",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32411"
},
{
"name": "CVE-2023-32371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32371"
},
{
"name": "CVE-2023-32413",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32413"
},
{
"name": "CVE-2023-32357",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32357"
},
{
"name": "CVE-2023-32398",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32398"
},
{
"name": "CVE-2023-32395",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32395"
},
{
"name": "CVE-2023-32390",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32390"
},
{
"name": "CVE-2023-23532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23532"
},
{
"name": "CVE-2023-32391",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32391"
},
{
"name": "CVE-2023-32412",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32412"
},
{
"name": "CVE-2023-32376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32376"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-32394",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32394"
},
{
"name": "CVE-2023-32372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32372"
},
{
"name": "CVE-2023-32408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32408"
},
{
"name": "CVE-2023-23535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23535"
},
{
"name": "CVE-2023-32367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32367"
},
{
"name": "CVE-2023-27930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27930"
},
{
"name": "CVE-2023-32385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32385"
},
{
"name": "CVE-2023-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32414"
},
{
"name": "CVE-2023-32392",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32392"
},
{
"name": "CVE-2023-32409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32409"
},
{
"name": "CVE-2023-32405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32405"
},
{
"name": "CVE-2023-32423",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32423"
},
{
"name": "CVE-2023-32419",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32419"
},
{
"name": "CVE-2023-27945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27945"
},
{
"name": "CVE-2023-32384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32384"
},
{
"name": "CVE-2023-32369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32369"
},
{
"name": "CVE-2023-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32415"
},
{
"name": "CVE-2023-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32387"
},
{
"name": "CVE-2023-32397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32397"
},
{
"name": "CVE-2023-32354",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32354"
},
{
"name": "CVE-2023-32420",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32420"
},
{
"name": "CVE-2023-32380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32380"
},
{
"name": "CVE-2023-32355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32355"
},
{
"name": "CVE-2023-32365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32365"
},
{
"name": "CVE-2023-27940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27940"
},
{
"name": "CVE-2023-32352",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32352"
},
{
"name": "CVE-2023-32422",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32422"
},
{
"name": "CVE-2023-32363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32363"
},
{
"name": "CVE-2023-28204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28204"
},
{
"name": "CVE-2023-28202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28202"
},
{
"name": "CVE-2023-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32386"
},
{
"name": "CVE-2023-28181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28181"
},
{
"name": "CVE-2023-32404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32404"
},
{
"name": "CVE-2023-32403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32403"
},
{
"name": "CVE-2023-32400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32400"
},
{
"name": "CVE-2023-28191",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28191"
}
],
"links": [],
"reference": "CERTFR-2023-AVI-0390",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits \u003cspan\nclass=\"textit\"\u003eApple\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, un d\u00e9ni de service et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213757 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213757"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213758 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213758"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213760 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213760"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213762 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213762"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213759 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213759"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213765 du 18 mai 2023",
"url": "https://support.apple.com/en-us/HT213765"
}
]
}
alsa-2023:3432
Vulnerability from osv_almalinux
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
- webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
- webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "webkit2gtk3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el9_2.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "webkit2gtk3-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el9_2.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "webkit2gtk3-jsc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el9_2.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "webkit2gtk3-jsc-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el9_2.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:3432",
"modified": "2023-06-06T06:15:24Z",
"published": "2023-06-05T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:3432"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-28204"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32373"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2209208"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2209214"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2023-3432.html"
}
],
"related": [
"CVE-2023-32373",
"CVE-2023-28204"
],
"summary": "Important: webkit2gtk3 security update"
}
alsa-2023:3433
Vulnerability from osv_almalinux
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
- webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)
- webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el8_8.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el8_8.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-jsc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el8_8.4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-jsc-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.38.5-1.el8_8.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2023:3433",
"modified": "2023-06-06T06:21:23Z",
"published": "2023-06-05T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2023:3433"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-28204"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-32373"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2209208"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2209214"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2023-3433.html"
}
],
"related": [
"CVE-2023-32373",
"CVE-2023-28204"
],
"summary": "Important: webkit2gtk3 security update"
}
BDU:2023-02858
Vulnerability from fstec - Published: 18.05.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Apple Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.7 (Astra Linux Special Edition), 4.7 (Astra Linux Special Edition), \u0434\u043e 9.5 (watchOS), \u0434\u043e 16.5 (tvOS), \u0434\u043e 16.5 (iOS), \u0434\u043e 16.5 (iPadOS), \u0434\u043e 16.5 (Safari)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: \nhttps://support.apple.com/en-us/HT213762\nhttps://support.apple.com/ru-ru/HT213757\nhttps://support.apple.com/ru-ru/HT213764\nhttps://support.apple.com/ru-ru/HT213761\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux Special Edition 1.7:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 webkit2gtk \u0434\u043e 2.40.5-1~deb11u1+ci202308141639+astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-1023SE17\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 webkit2gtk \u0434\u043e 2.42.2-1~deb11u1+ci202311201532+astra3 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-0416SE47",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "18.05.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.05.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-02858",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-28204",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), watchOS, tvOS, iOS, iPadOS, Safari",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Apple Inc. watchOS \u0434\u043e 9.5 , Apple Inc. tvOS \u0434\u043e 16.5 , Apple Inc. iOS \u0434\u043e 16.5 , Apple Inc. iPadOS \u0434\u043e 16.5 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKit \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c iOS, iPadOS, watchOS,tvOS, \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Safari, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKit \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c iOS, iPadOS, watchOS,tvOS, \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Safari \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0447\u0442\u0435\u043d\u0438\u0435\u043c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://support.apple.com/en-us/HT213762\nhttps://support.apple.com/ru-ru/HT213757\nhttps://support.apple.com/ru-ru/HT213764\nhttps://support.apple.com/ru-ru/HT213761\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2023-1023SE17\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-0416SE47\nhttps://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)"
}
FKIE_CVE-2023-28204
Vulnerability from fkie_nvd - Published: 2023-06-23 18:15 - Updated: 2025-10-23 18:486.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | https://security.gentoo.org/glsa/202401-04 | Third Party Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213757 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213758 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213761 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213762 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213764 | Release Notes, Vendor Advisory | |
| product-security@apple.com | https://support.apple.com/en-us/HT213765 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202401-04 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213757 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213758 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213761 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213762 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213764 | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT213765 | Release Notes, Vendor Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204 | US Government Resource |
{
"cisaActionDue": "2023-06-12",
"cisaExploitAdd": "2023-05-22",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21B2F081-D602-4C84-8343-6327B23176D1",
"versionEndExcluding": "16.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC9E481-57D3-4F4D-A8D2-7DA0272F0706",
"versionEndExcluding": "15.7.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "830FA87A-4E89-4E04-A8AF-A1FF08D77B2E",
"versionEndExcluding": "16.5",
"versionStartIncluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B89F737-4ADD-424C-A946-F368A7ABBE6D",
"versionEndExcluding": "15.7.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "424F077B-6678-4CE3-A216-C98E6D48F8AC",
"versionEndExcluding": "16.5",
"versionStartIncluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA07361B-D827-471F-9443-4BE4265D6A3B",
"versionEndExcluding": "13.4",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D36613A6-BD83-4A57-8EE1-C186EB69DFF9",
"versionEndExcluding": "16.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5DB973-7B51-4232-8E1D-231078FE275C",
"versionEndExcluding": "9.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C7F88F0-0092-4338-A52F-1A2ED27460B5",
"versionEndExcluding": "2.42.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited."
}
],
"id": "CVE-2023-28204",
"lastModified": "2025-10-23T18:48:24.987",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-06-23T18:15:11.333",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202401-04"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213757"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213758"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213761"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213762"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213764"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213765"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202401-04"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213757"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213758"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213761"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213762"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213764"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213765"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-M85J-WJRJ-C4RG
Vulnerability from github – Published: 2023-06-23 18:30 – Updated: 2025-10-22 00:32An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, Safari 16.5, tvOS 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.
{
"affected": [],
"aliases": [
"CVE-2023-28204"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-06-23T18:15:11Z",
"severity": "MODERATE"
},
"details": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, iOS 15.7.6 and iPadOS 15.7.6, macOS Ventura 13.4, Safari 16.5, tvOS 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.",
"id": "GHSA-m85j-wjrj-c4rg",
"modified": "2025-10-22T00:32:44Z",
"published": "2023-06-23T18:30:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202401-04"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213757"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213758"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213761"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213762"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213764"
},
{
"type": "WEB",
"url": "https://support.apple.com/en-us/HT213765"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28204"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2023-28204
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-28204",
"id": "GSD-2023-28204"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-28204"
],
"details": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited.",
"id": "GSD-2023-28204",
"modified": "2023-12-13T01:20:48.782504Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2023-28204",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "13.4"
}
]
}
},
{
"product_name": "Safari",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "16.5"
}
]
}
},
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "9.5"
}
]
}
},
{
"product_name": "iOS and iPadOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "15.7"
}
]
}
},
{
"product_name": "tvOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "unspecified",
"version_value": "16.5"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited."
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT213758",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213758"
},
{
"name": "https://support.apple.com/en-us/HT213762",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213762"
},
{
"name": "https://support.apple.com/en-us/HT213764",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213764"
},
{
"name": "https://support.apple.com/en-us/HT213765",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213765"
},
{
"name": "https://support.apple.com/en-us/HT213757",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213757"
},
{
"name": "https://support.apple.com/en-us/HT213761",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT213761"
},
{
"name": "https://security.gentoo.org/glsa/202401-04",
"refsource": "MISC",
"url": "https://security.gentoo.org/glsa/202401-04"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"cisaActionDue": "2023-06-12",
"cisaExploitAdd": "2023-05-22",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21B2F081-D602-4C84-8343-6327B23176D1",
"versionEndExcluding": "16.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EC9E481-57D3-4F4D-A8D2-7DA0272F0706",
"versionEndExcluding": "15.7.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "830FA87A-4E89-4E04-A8AF-A1FF08D77B2E",
"versionEndExcluding": "16.5",
"versionStartIncluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B89F737-4ADD-424C-A946-F368A7ABBE6D",
"versionEndExcluding": "15.7.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "424F077B-6678-4CE3-A216-C98E6D48F8AC",
"versionEndExcluding": "16.5",
"versionStartIncluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA07361B-D827-471F-9443-4BE4265D6A3B",
"versionEndExcluding": "13.4",
"versionStartIncluding": "13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D36613A6-BD83-4A57-8EE1-C186EB69DFF9",
"versionEndExcluding": "16.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5DB973-7B51-4232-8E1D-231078FE275C",
"versionEndExcluding": "9.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been actively exploited."
}
],
"id": "CVE-2023-28204",
"lastModified": "2024-01-05T14:15:46.340",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-06-23T18:15:11.333",
"references": [
{
"source": "product-security@apple.com",
"url": "https://security.gentoo.org/glsa/202401-04"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213757"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213758"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213761"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213762"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213764"
},
{
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT213765"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
RHSA-2023:3432
Vulnerability from csaf_redhat - Published: 2023-06-05 19:04 - Updated: 2025-11-21 18:41A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2023:3432 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209208 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209214 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2023-28204 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209208 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-28204 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-28204 | external |
| https://www.cisa.gov/known-exploited-vulnerabilit… | external |
| https://access.redhat.com/security/cve/CVE-2023-32373 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209214 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-32373 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-32373 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3432",
"url": "https://access.redhat.com/errata/RHSA-2023:3432"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3432.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-11-21T18:41:07+00:00",
"generator": {
"date": "2025-11-21T18:41:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:3432",
"initial_release_date": "2023-06-05T19:04:07+00:00",
"revision_history": [
{
"date": "2023-06-05T19:04:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-06-05T19:04:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:41:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"product_id": "webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-28204",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209208"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: an out-of-bounds read when processing malicious content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28204"
},
{
"category": "external",
"summary": "RHBZ#2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-05T19:04:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3432"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: an out-of-bounds read when processing malicious content"
},
{
"cve": "CVE-2023-32373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209214"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: a use-after-free when processing maliciously crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32373"
},
{
"category": "external",
"summary": "RHBZ#2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-05T19:04:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3432"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.src",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.2.x86_64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.aarch64",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.i686",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.ppc64le",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.s390x",
"AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: a use-after-free when processing maliciously crafted web content"
}
]
}
RHSA-2023:3433
Vulnerability from csaf_redhat - Published: 2023-06-05 18:57 - Updated: 2025-11-21 18:41A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2023:3433 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209208 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209214 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2023-28204 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209208 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-28204 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-28204 | external |
| https://www.cisa.gov/known-exploited-vulnerabilit… | external |
| https://access.redhat.com/security/cve/CVE-2023-32373 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2209214 | external |
| https://www.cve.org/CVERecord?id=CVE-2023-32373 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2023-32373 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:3433",
"url": "https://access.redhat.com/errata/RHSA-2023:3433"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3433.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security update",
"tracking": {
"current_release_date": "2025-11-21T18:41:10+00:00",
"generator": {
"date": "2025-11-21T18:41:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:3433",
"initial_release_date": "2023-06-05T18:57:13+00:00",
"revision_history": [
{
"date": "2023-06-05T18:57:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-06-05T18:57:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:41:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"product_id": "webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-28204",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209208"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: an out-of-bounds read when processing malicious content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28204"
},
{
"category": "external",
"summary": "RHBZ#2209208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28204"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-05T18:57:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3433"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: an out-of-bounds read when processing malicious content"
},
{
"cve": "CVE-2023-32373",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2209214"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: a use-after-free when processing maliciously crafted web content",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-32373"
},
{
"category": "external",
"summary": "RHBZ#2209214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2023-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-06-05T18:57:13+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:3433"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.src",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.4.x86_64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.aarch64",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.i686",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.ppc64le",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.s390x",
"AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.4.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2023-05-22T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "webkitgtk: a use-after-free when processing maliciously crafted web content"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.