Action not permitted
Modal body text goes here.
cve-2023-42917
Vulnerability from cvelistv5
Published
2023-11-30 22:18
Modified
2024-08-02 19:30
Severity
Summary
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
References
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2023-12-04
Due date: 2023-12-25
Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
Used in ransomware: Unknown
Notes: https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:30:24.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT214033" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT214032" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/en-us/HT214031" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214033" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/05/1" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214034" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5575" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/3" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/4" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/5" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/8" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/13" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Dec/12" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202401-04" }, { "tags": [ "x_transferred" ], "url": "https://support.apple.com/kb/HT214062" }, { "tags": [ "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2024/Jan/35" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Safari", "vendor": "Apple", "versions": [ { "lessThan": "17.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "14.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "17.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-30T22:18:50.340Z", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "url": "https://support.apple.com/en-us/HT214033" }, { "url": "https://support.apple.com/en-us/HT214032" }, { "url": "https://support.apple.com/en-us/HT214031" }, { "url": "https://support.apple.com/kb/HT214033" }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/05/1" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/" }, { "url": "https://support.apple.com/kb/HT214034" }, { "url": "https://www.debian.org/security/2023/dsa-5575" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/3" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/4" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/5" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/8" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/13" }, { "url": "http://seclists.org/fulldisclosure/2023/Dec/12" }, { "url": "https://security.gentoo.org/glsa/202401-04" }, { "url": "https://support.apple.com/kb/HT214062" }, { "url": "http://seclists.org/fulldisclosure/2024/Jan/35" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2023-42917", "datePublished": "2023-11-30T22:18:50.340Z", "dateReserved": "2023-09-14T19:05:11.463Z", "dateUpdated": "2024-08-02T19:30:24.968Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "cisa_known_exploited": { "cveID": "CVE-2023-42917", "dateAdded": "2023-12-04", "dueDate": "2023-12-25", "knownRansomwareCampaignUse": "Unknown", "notes": "https://support.apple.com/en-us/HT214031, https://support.apple.com/en-us/HT214032, https://support.apple.com/en-us/HT214033", "product": "Multiple Products", "requiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.", "shortDescription": "Apple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.", "vendorProject": "Apple", "vulnerabilityName": "Apple Multiple Products WebKit Memory Corruption Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2023-42917\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2023-11-30T23:15:07.280\",\"lastModified\":\"2024-06-26T20:01:23.280\",\"vulnStatus\":\"Analyzed\",\"cisaExploitAdd\":\"2023-12-04\",\"cisaActionDue\":\"2023-12-25\",\"cisaRequiredAction\":\"Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Apple Multiple Products WebKit Memory Corruption Vulnerability\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 una vulnerabilidad de corrupci\u00f3n de memoria con un bloqueo mejorado. Este problema se solucion\u00f3 en iOS 17.1.2 y iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario. Apple tiene conocimiento de un informe que indica que este problema puede haberse explotado en versiones de iOS anteriores a iOS 16.7.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.1.2\",\"matchCriteriaId\":\"FB99F7C8-7DB8-41EB-817C-CCA0B26A8573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.8.1\",\"matchCriteriaId\":\"328EF092-09AD-4809-A921-7390D4CE4BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"16.7.3\",\"matchCriteriaId\":\"47A8EDA8-BDDB-413A-AF89-C10FD7B1EA06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0\",\"versionEndExcluding\":\"17.1.2\",\"matchCriteriaId\":\"3DA5F940-604E-4F88-BB50-51EC9A39E8A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.8.1\",\"matchCriteriaId\":\"7A20BCB8-8DB0-495A-8946-036926C91E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"16.7.3\",\"matchCriteriaId\":\"D8EBFB96-37E1-4861-83BB-ECE8770C9153\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0\",\"versionEndExcluding\":\"17.1.2\",\"matchCriteriaId\":\"89BC75AA-3A30-4D2B-80C3-C3F754689AC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"14.0\",\"versionEndExcluding\":\"14.1.2\",\"matchCriteriaId\":\"A5BB9989-686F-4AD9-B34E-4FB5161AB658\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46D69DCC-AE4D-4EA5-861C-D60951444C6C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:webkitgtk:webkitgtk\\\\+:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.42.3\",\"matchCriteriaId\":\"8C7F88F0-0092-4338-A52F-1A2ED27460B5\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2023/Dec/12\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Dec/13\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Dec/3\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Dec/4\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Dec/5\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2023/Dec/8\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2024/Jan/35\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/12/05/1\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Release Notes\"]},{\"url\":\"https://security.gentoo.org/glsa/202401-04\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT214031\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT214032\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT214033\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT214033\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT214034\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT214062\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.debian.org/security/2023/dsa-5575\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}" } }
wid-sec-w-2023-3036
Vulnerability from csaf_certbund
Published
2023-11-30 23:00
Modified
2023-11-30 23:00
Summary
Apple macOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Code auszuführen oder um vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- MacOS X
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Code auszuf\u00fchren oder um vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-3036 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3036.json" }, { "category": "self", "summary": "WID-SEC-2023-3036 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3036" }, { "category": "external", "summary": "Apple Security Advisory vom 2023-11-30", "url": "https://support.apple.com/en-us/HT214032" } ], "source_lang": "en-US", "title": "Apple macOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-30T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:52:51.452+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-3036", "initial_release_date": "2023-11-30T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-30T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple macOS \u003c Sonoma 14.1.2", "product": { "name": "Apple macOS \u003c Sonoma 14.1.2", "product_id": "T020451", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:-" } } } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42917", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS. Diese Fehler bestehen in der WebKit-Komponente aufgrund eines Out-of-Bounds-Read-Problems und eines Speicherkorruptionsproblems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "release_date": "2023-11-30T23:00:00Z", "title": "CVE-2023-42917" }, { "cve": "CVE-2023-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple macOS. Diese Fehler bestehen in der WebKit-Komponente aufgrund eines Out-of-Bounds-Read-Problems und eines Speicherkorruptionsproblems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "release_date": "2023-11-30T23:00:00Z", "title": "CVE-2023-42916" } ] }
wid-sec-w-2023-3042
Vulnerability from csaf_certbund
Published
2023-11-30 23:00
Modified
2023-11-30 23:00
Summary
Apple Safari: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Safari ist der auf Apple Geräten eingesetzte Web Browser.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Apple Safari ausnutzen, um beliebigen Code auszuführen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- MacOS X
- iPhoneOS
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Safari ist der auf Apple Ger\u00e4ten eingesetzte Web Browser.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Apple Safari ausnutzen, um beliebigen Code auszuf\u00fchren oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X\n- iPhoneOS", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-3042 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3042.json" }, { "category": "self", "summary": "WID-SEC-2023-3042 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3042" }, { "category": "external", "summary": "Apple Security Advisory vom 2023-11-30", "url": "https://support.apple.com/kb/HT214033" } ], "source_lang": "en-US", "title": "Apple Safari: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-11-30T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:52:55.982+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-3042", "initial_release_date": "2023-11-30T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-30T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple Safari \u003c 17.1.2", "product": { "name": "Apple Safari \u003c 17.1.2", "product_id": "T031425", "product_identification_helper": { "cpe": "cpe:/a:apple:safari:17.1.2" } } } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42917", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Fehler bestehen in der WebKit-Komponente aufgrund eines Out-of-Bounds-Read-Problems und eines Speicherkorruptionsproblems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "release_date": "2023-11-30T23:00:00Z", "title": "CVE-2023-42917" }, { "cve": "CVE-2023-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple Safari. Diese Fehler bestehen in der WebKit-Komponente aufgrund eines Out-of-Bounds-Read-Problems und eines Speicherkorruptionsproblems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "release_date": "2023-11-30T23:00:00Z", "title": "CVE-2023-42916" } ] }
wid-sec-w-2023-3095
Vulnerability from csaf_certbund
Published
2023-12-11 23:00
Modified
2024-03-25 23:00
Summary
Apple iOS und iPadOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Angriff
Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsmaßnahmen zu umgehen.
Betroffene Betriebssysteme
- iPhoneOS
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- iPhoneOS", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-3095 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3095.json" }, { "category": "self", "summary": "WID-SEC-2023-3095 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3095" }, { "category": "external", "summary": "Apple security update vom 2023-12-11", "url": "https://support.apple.com/kb/HT214034" }, { "category": "external", "summary": "Apple security update vom 2023-12-11", "url": "https://support.apple.com/kb/HT214035" }, { "category": "external", "summary": "Apple Security Advisory HT214062 vom 2024-01-22", "url": "https://support.apple.com/en-us/HT214062" } ], "source_lang": "en-US", "title": "Apple iOS und iPadOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-03-25T23:00:00.000+00:00", "generator": { "date": "2024-03-26T09:02:20.933+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-3095", "initial_release_date": "2023-12-11T23:00:00.000+00:00", "revision_history": [ { "date": "2023-12-11T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Apple aufgenommen" }, { "date": "2024-03-25T23:00:00.000+00:00", "number": "3", "summary": "CVE\u0027s erg\u00e4nzt" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c 16.7.3", "product": { "name": "Apple iOS \u003c 16.7.3", "product_id": "T031580", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:16.7.3" } } }, { "category": "product_version_range", "name": "\u003c 17.2", "product": { "name": "Apple iOS \u003c 17.2", "product_id": "T031583", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:17.2" } } }, { "category": "product_version_range", "name": "\u003c 15.8.1", "product": { "name": "Apple iOS \u003c 15.8.1", "product_id": "T032277", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:15.8.1" } } } ], "category": "product_name", "name": "iOS" }, { "branches": [ { "category": "product_version_range", "name": "\u003c 16.7.3", "product": { "name": "Apple iPadOS \u003c 16.7.3", "product_id": "T031581", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:16.7.3" } } }, { "category": "product_version_range", "name": "\u003c 17.2", "product": { "name": "Apple iPadOS \u003c 17.2", "product_id": "T031582", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:17.2" } } }, { "category": "product_version_range", "name": "\u003c 15.8.1", "product": { "name": "Apple iPadOS \u003c 15.8.1", "product_id": "T032278", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:15.8.1" } } } ], "category": "product_name", "name": "iPadOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42883", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42883" }, { "cve": "CVE-2023-42884", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42884" }, { "cve": "CVE-2023-42890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42890" }, { "cve": "CVE-2023-42893", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42893" }, { "cve": "CVE-2023-42896", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42896" }, { "cve": "CVE-2023-42897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42897" }, { "cve": "CVE-2023-42898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42898" }, { "cve": "CVE-2023-42899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42899" }, { "cve": "CVE-2023-42914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42914" }, { "cve": "CVE-2023-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42916" }, { "cve": "CVE-2023-42917", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42917" }, { "cve": "CVE-2023-42919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42919" }, { "cve": "CVE-2023-42922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42922" }, { "cve": "CVE-2023-42923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42923" }, { "cve": "CVE-2023-42927", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42927" }, { "cve": "CVE-2023-42936", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42936" }, { "cve": "CVE-2023-42941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42941" }, { "cve": "CVE-2023-42947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42947" }, { "cve": "CVE-2023-42950", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42950" }, { "cve": "CVE-2023-42956", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42956" }, { "cve": "CVE-2023-42962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42962" }, { "cve": "CVE-2023-42974", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-42974" }, { "cve": "CVE-2023-45866", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in mehreren Komponenten wie Accounts, Find My, WebKit oder Kernel, unter anderem aufgrund mehrerer Sicherheitsprobleme wie unsachgem\u00e4\u00dfer Speicherbehandlung oder unsachgem\u00e4\u00dfer Validierung von Benutzereingaben. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen oder Sicherheitsma\u00dfnahmen zu umgehen. Einige der Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-12-11T23:00:00Z", "title": "CVE-2023-45866" } ] }
wid-sec-w-2023-3035
Vulnerability from csaf_certbund
Published
2023-11-30 23:00
Modified
2024-01-23 23:00
Summary
Apple iOS und Apple iPadOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das Apple iOS (vormals iPhone OS) ist das Betriebssystem für das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.
Das Apple iPadOS ist das Betriebssystem für das von Apple entwickelte iPad.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuführen oder vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- iPhoneOS
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das Apple iOS (vormals iPhone OS) ist das Betriebssystem f\u00fcr das von Apple entwickelte Smartphone iPhone, iPad und iPod Touch.\r\nDas Apple iPadOS ist das Betriebssystem f\u00fcr das von Apple entwickelte iPad.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Apple iOS und Apple iPadOS ausnutzen, um beliebigen Code auszuf\u00fchren oder vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- iPhoneOS", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-3035 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3035.json" }, { "category": "self", "summary": "WID-SEC-2023-3035 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3035" }, { "category": "external", "summary": "Apple Security Advisory vom 2023-11-30", "url": "https://support.apple.com/en-us/HT214031" }, { "category": "external", "summary": "Apple Security Advisory HT214062 vom 2024-01-22", "url": "https://support.apple.com/en-us/HT214062" } ], "source_lang": "en-US", "title": "Apple iOS und Apple iPadOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-23T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:52:50.650+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-3035", "initial_release_date": "2023-11-30T23:00:00.000+00:00", "revision_history": [ { "date": "2023-11-30T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Apple aufgenommen" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "3", "summary": "Titel angepasst" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple iOS \u003c 17.1.2", "product": { "name": "Apple iOS \u003c 17.1.2", "product_id": "T031418", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:17.1.2" } } }, { "category": "product_name", "name": "Apple iOS \u003c 15.8.1", "product": { "name": "Apple iOS \u003c 15.8.1", "product_id": "T032277", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:15.8.1" } } } ], "category": "product_name", "name": "iOS" }, { "branches": [ { "category": "product_name", "name": "Apple iPadOS \u003c 17.1.2", "product": { "name": "Apple iPadOS \u003c 17.1.2", "product_id": "T031420", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:17.1.2" } } }, { "category": "product_name", "name": "Apple iPadOS \u003c 15.8.1", "product": { "name": "Apple iPadOS \u003c 15.8.1", "product_id": "T032278", "product_identification_helper": { "cpe": "cpe:/o:apple:ipados:15.8.1" } } } ], "category": "product_name", "name": "iPadOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42917", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in der WebKit-Komponente aufgrund eines Out-of-Bounds-Read-Problems und eines Speicherkorruptionsproblems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-11-30T23:00:00Z", "title": "CVE-2023-42917" }, { "cve": "CVE-2023-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Apple iOS und Apple iPadOS. Diese Fehler bestehen in der WebKit-Komponente aufgrund eines Out-of-Bounds-Read-Problems und eines Speicherkorruptionsproblems. Ein entfernter Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen offenzulegen oder beliebigen Code auszuf\u00fchren. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T032278", "T032277" ] }, "release_date": "2023-11-30T23:00:00Z", "title": "CVE-2023-42916" } ] }
rhsa-2023_7715
Vulnerability from csaf_redhat
Published
2023-12-11 09:43
Modified
2024-09-16 16:14
Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7715", "url": "https://access.redhat.com/errata/RHSA-2023:7715" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_7715.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2024-09-16T16:14:35+00:00", "generator": { "date": "2024-09-16T16:14:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2023:7715", "initial_release_date": "2023-12-11T09:43:45+00:00", "revision_history": [ { "date": "2023-12-11T09:43:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-12-11T09:43:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T16:14:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.src", "product": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.src", "product_id": "webkit2gtk3-0:2.40.5-1.el9_3.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el9_3.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el9_3.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el9_3.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el9_3.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el9_3.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el9_3.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el9_3.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el9_3.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el9_3.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el9_3.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el9_3.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.src" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el9_3.1.src", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "relates_to_product_reference": "AppStream-9.3.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.src", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.src", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7715" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.src", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.src", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el9_3.1.x86_64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.aarch64", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.i686", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.ppc64le", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.s390x", "AppStream-9.3.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el9_3.1.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" } ] }
rhsa-2023_7716
Vulnerability from csaf_redhat
Published
2023-12-11 09:56
Modified
2024-09-16 16:14
Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat offerings.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:7716", "url": "https://access.redhat.com/errata/RHSA-2023:7716" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/data/csaf/v2/advisories/2023/rhsa-2023_7716.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2024-09-16T16:14:45+00:00", "generator": { "date": "2024-09-16T16:14:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "3.33.3" } }, "id": "RHSA-2023:7716", "initial_release_date": "2023-12-11T09:56:30+00:00", "revision_history": [ { "date": "2023-12-11T09:56:30+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-12-11T09:56:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-09-16T16:14:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.src", "product": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.src", "product_id": "webkit2gtk3-0:2.40.5-1.el8_9.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el8_9.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el8_9.1?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el8_9.1?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el8_9.1?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el8_9.1?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el8_9.1?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el8_9.1?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el8_9.1?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el8_9.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.40.5-1.el8_9.1?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.40.5-1.el8_9.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.src" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el8_9.1.src", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.src", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.src", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:7716" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.src", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.src", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-debugsource-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.40.5-1.el8_9.1.x86_64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.aarch64", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.i686", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.ppc64le", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.s390x", "AppStream-8.9.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.40.5-1.el8_9.1.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" } ] }
gsd-2023-42917
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-42917", "id": "GSD-2023-42917" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-42917" ], "details": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.", "id": "GSD-2023-42917", "modified": "2023-12-13T01:20:22.127447Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2023-42917", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Safari", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "unspecified", "version_value": "17.1" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "unspecified", "version_value": "14.1" } ] } }, { "product_name": "iOS and iPadOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "unspecified", "version_value": "17.1" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1." } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT214033", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT214033" }, { "name": "https://support.apple.com/en-us/HT214032", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT214032" }, { "name": "https://support.apple.com/en-us/HT214031", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT214031" }, { "name": "http://www.openwall.com/lists/oss-security/2023/12/05/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2023/12/05/1" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/" }, { "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/", "refsource": "MISC", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/" }, { "name": "https://www.debian.org/security/2023/dsa-5575", "refsource": "MISC", "url": "https://www.debian.org/security/2023/dsa-5575" }, { "name": "http://seclists.org/fulldisclosure/2023/Dec/3", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2023/Dec/3" }, { "name": "http://seclists.org/fulldisclosure/2023/Dec/4", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2023/Dec/4" }, { "name": "http://seclists.org/fulldisclosure/2023/Dec/5", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2023/Dec/5" }, { "name": "http://seclists.org/fulldisclosure/2023/Dec/8", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2023/Dec/8" }, { "name": "http://seclists.org/fulldisclosure/2023/Dec/13", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2023/Dec/13" }, { "name": "http://seclists.org/fulldisclosure/2023/Dec/12", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2023/Dec/12" }, { "name": "https://security.gentoo.org/glsa/202401-04", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/202401-04" }, { "name": "http://seclists.org/fulldisclosure/2024/Jan/35", "refsource": "MISC", "url": "http://seclists.org/fulldisclosure/2024/Jan/35" } ] } }, "nvd.nist.gov": { "cve": { "cisaActionDue": "2023-12-25", "cisaExploitAdd": "2023-12-04", "cisaRequiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.", "cisaVulnerabilityName": "Apple Multiple Products WebKit Memory Corruption Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB99F7C8-7DB8-41EB-817C-CCA0B26A8573", "versionEndExcluding": "17.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CBCA63E-AB12-4A04-97C6-06BA77F60328", "versionEndExcluding": "17.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDB36DBA-C69A-42A9-A05D-506E41F83BC9", "versionEndExcluding": "17.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5BB9989-686F-4AD9-B34E-4FB5161AB658", "versionEndExcluding": "14.1.2", "versionStartIncluding": "14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1." }, { "lang": "es", "value": "Se solucion\u00f3 una vulnerabilidad de corrupci\u00f3n de memoria con un bloqueo mejorado. Este problema se solucion\u00f3 en iOS 17.1.2 y iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. El procesamiento de contenido web puede dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario. Apple tiene conocimiento de un informe que indica que este problema puede haberse explotado en versiones de iOS anteriores a iOS 16.7.1." } ], "id": "CVE-2023-42917", "lastModified": "2024-01-26T17:15:10.113", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-30T23:15:07.280", "references": [ { "source": "product-security@apple.com", "url": "http://seclists.org/fulldisclosure/2023/Dec/12" }, { "source": "product-security@apple.com", "url": "http://seclists.org/fulldisclosure/2023/Dec/13" }, { "source": "product-security@apple.com", "url": "http://seclists.org/fulldisclosure/2023/Dec/3" }, { "source": "product-security@apple.com", "url": "http://seclists.org/fulldisclosure/2023/Dec/4" }, { "source": "product-security@apple.com", "url": "http://seclists.org/fulldisclosure/2023/Dec/5" }, { "source": "product-security@apple.com", "url": "http://seclists.org/fulldisclosure/2023/Dec/8" }, { "source": "product-security@apple.com", "url": "http://seclists.org/fulldisclosure/2024/Jan/35" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/05/1" }, { "source": "product-security@apple.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/" }, { "source": "product-security@apple.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/" }, { "source": "product-security@apple.com", "url": "https://security.gentoo.org/glsa/202401-04" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT214031" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT214032" }, { "source": "product-security@apple.com", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT214033" }, { "source": "product-security@apple.com", "url": "https://www.debian.org/security/2023/dsa-5575" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-phhr-cqm7-gjv6
Vulnerability from github
Published
2023-12-01 00:31
Modified
2024-06-12 12:30
Severity
Details
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
{ "affected": [], "aliases": [ "CVE-2023-42917" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-11-30T23:15:07Z", "severity": "HIGH" }, "details": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.", "id": "GHSA-phhr-cqm7-gjv6", "modified": "2024-06-12T12:30:39Z", "published": "2023-12-01T00:31:00Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/202401-04" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT214031" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT214032" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT214033" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT214033" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT214034" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT214062" }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5575" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Dec/12" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Dec/13" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Dec/3" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Dec/4" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Dec/5" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2023/Dec/8" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2024/Jan/35" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2023/12/05/1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading...