Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-44187
Vulnerability from cvelistv5
Published
2024-09-16 23:23
Modified
2024-09-17 13:46
Severity ?
EPSS score ?
Summary
A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin.
References
▼ | URL | Tags | |
---|---|---|---|
product-security@apple.com | https://support.apple.com/en-us/121238 | Release Notes, Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/121240 | Release Notes, Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/121241 | Release Notes, Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/121248 | Release Notes, Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/121249 | Release Notes, Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/121250 | Release Notes, Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-44187", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-17T13:44:18.458972Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-17T13:46:52.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "15", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "18", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "visionOS", "vendor": "Apple", "versions": [ { "lessThan": "2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "18", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "11", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Safari", "vendor": "Apple", "versions": [ { "lessThan": "18", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A cross-origin issue existed with \"iframe\" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin." } ], "problemTypes": [ { "descriptions": [ { "description": "A malicious website may exfiltrate data cross-origin", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-16T23:23:16.230Z", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "url": "https://support.apple.com/en-us/121238" }, { "url": "https://support.apple.com/en-us/121248" }, { "url": "https://support.apple.com/en-us/121249" }, { "url": "https://support.apple.com/en-us/121250" }, { "url": "https://support.apple.com/en-us/121240" }, { "url": "https://support.apple.com/en-us/121241" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2024-44187", "datePublished": "2024-09-16T23:23:16.230Z", "dateReserved": "2024-08-20T21:42:05.933Z", "dateUpdated": "2024-09-17T13:46:52.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-44187\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2024-09-17T00:15:52.037\",\"lastModified\":\"2024-09-25T13:25:52.043\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A cross-origin issue existed with \\\"iframe\\\" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin.\"},{\"lang\":\"es\",\"value\":\"Exist\u00eda un problema de origen cruzado con los elementos \\\"iframe\\\". Esto se solucion\u00f3 mejorando el seguimiento de los or\u00edgenes de seguridad. Este problema se solucion\u00f3 en Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18, iPadOS 18 y tvOS 18. Un sitio web malicioso puede filtrar datos de origen cruzado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-346\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.0\",\"matchCriteriaId\":\"0DCB4657-8F40-418E-8E98-743C271E4CDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.0\",\"matchCriteriaId\":\"ACD3B3B0-329C-413B-BDF7-6B1C6298846E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.0\",\"matchCriteriaId\":\"2222A2EE-00FA-4019-8779-13B82A4F9DD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.0\",\"matchCriteriaId\":\"E8017C16-A17E-4AE7-9A0B-1295200A3A45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.0\",\"matchCriteriaId\":\"F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.0\",\"matchCriteriaId\":\"A6AE7B0F-C356-4601-9636-617CDD09F009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"11.0\",\"matchCriteriaId\":\"05C212C2-3E65-47DB-A0AE-417A8178ADC6\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/121238\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121240\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121241\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121248\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121249\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/121250\",\"source\":\"product-security@apple.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}" } }
ncsc-2024-0382
Vulnerability from csaf_ncscnl
Published
2024-09-26 08:52
Modified
2024-09-26 08:52
Summary
Kwetsbaarheden verholpen in Apple iOS en iPadOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Cross-Site-Scripting (XSS)
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van beveiligingsmaatregel
- Toegang tot gevoelige gegevens
- Toegang tot systeemgegevens
Voor succesvol misbruik moet de kwaadwillende fysieke toegang hebben tot het kwetsbare apparaat, het slachtoffer misleiden een malafide app te installeren en draaien of een malafide link te volgen.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in iOS en iPadOS 17.7 en 18. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-190
Integer Overflow or Wraparound
CWE-285
Improper Authorization
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-287
Improper Authentication
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Cross-Site-Scripting (XSS)\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- Toegang tot gevoelige gegevens\n- Toegang tot systeemgegevens\n\nVoor succesvol misbruik moet de kwaadwillende fysieke toegang hebben tot het kwetsbare apparaat, het slachtoffer misleiden een malafide app te installeren en draaien of een malafide link te volgen.\n", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in iOS en iPadOS 17.7 en 18. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Authorization", "title": "CWE-285" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121250" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121246" } ], "title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS", "tracking": { "current_release_date": "2024-09-26T08:52:21.805564Z", "id": "NCSC-2024-0382", "initial_release_date": "2024-09-26T08:52:21.805564Z", "revision_history": [ { "date": "2024-09-26T08:52:21.805564Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "ios__17.7", "product": { "name": "ios__17.7", "product_id": "CSAFPID-1644315", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__17.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ios__18", "product": { "name": "ios__18", "product_id": "CSAFPID-1644312", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__18:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ipados__17.7", "product": { "name": "ipados__17.7", "product_id": "CSAFPID-1644313", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__17.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ipados__18", "product": { "name": "ipados__18", "product_id": "CSAFPID-1644314", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__18:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5841", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2023-5841" }, { "cve": "CVE-2024-27869", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27869.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27869" }, { "cve": "CVE-2024-27874", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27874" }, { "cve": "CVE-2024-27876", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27876.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27876" }, { "cve": "CVE-2024-27879", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27879", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27879.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27879" }, { "cve": "CVE-2024-27880", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27880", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27880.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27880" }, { "cve": "CVE-2024-40791", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40791" }, { "cve": "CVE-2024-40826", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40826", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40826.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40826" }, { "cve": "CVE-2024-40830", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40830", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40830.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40830" }, { "cve": "CVE-2024-40840", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40840", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40840.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40840" }, { "cve": "CVE-2024-40844", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40844", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40844.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40844" }, { "cve": "CVE-2024-40850", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40850", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40850.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40850" }, { "cve": "CVE-2024-40852", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40852", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40852.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40852" }, { "cve": "CVE-2024-40856", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40856", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40856.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40856" }, { "cve": "CVE-2024-40857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40857" }, { "cve": "CVE-2024-40863", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40863.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40863" }, { "cve": "CVE-2024-44124", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44124.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44124" }, { "cve": "CVE-2024-44127", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44127.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44127" }, { "cve": "CVE-2024-44131", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44131" }, { "cve": "CVE-2024-44139", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44139", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44139.json" } ], "title": "CVE-2024-44139" }, { "cve": "CVE-2024-44147", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44147.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44147" }, { "cve": "CVE-2024-44158", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44158.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44158" }, { "cve": "CVE-2024-44164", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44164", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44164.json" } ], "title": "CVE-2024-44164" }, { "cve": "CVE-2024-44165", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44165.json" } ], "title": "CVE-2024-44165" }, { "cve": "CVE-2024-44167", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44167" }, { "cve": "CVE-2024-44169", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44169" }, { "cve": "CVE-2024-44170", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44170.json" } ], "title": "CVE-2024-44170" }, { "cve": "CVE-2024-44171", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44171" }, { "cve": "CVE-2024-44176", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44176" }, { "cve": "CVE-2024-44180", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44180.json" } ], "title": "CVE-2024-44180" }, { "cve": "CVE-2024-44183", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44183.json" } ], "title": "CVE-2024-44183" }, { "cve": "CVE-2024-44184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44184" }, { "cve": "CVE-2024-44187", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44187.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44187" }, { "cve": "CVE-2024-44191", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44191" }, { "cve": "CVE-2024-44198", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44198.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44198" }, { "cve": "CVE-2024-44202", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44202.json" } ], "title": "CVE-2024-44202" } ] }
ncsc-2024-0457
Vulnerability from csaf_ncscnl
Published
2024-11-20 10:01
Modified
2024-11-20 10:01
Summary
Kwetsbaarheden verholpen in Apple iOS en iPadOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.
Interpretaties
Twee kwetsbaarheden in iOS en iPadOS 17.7.2 (CVE-2024-44308 & CVE-2024-44309) kunnen leiden tot het uitvoeren van willekeurige code. Apple geeft aan dat actief misbruik van deze kwetsbaarheden bekend is.
Een kwaadwillende kan de kwetsbaarheden in iOS en iPadOS 18 misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Cross-Site Scripting (XSS)
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Manipulatie van gegevens
* Omzeilen van authenticatie
* Omzeilen van beveiligingsmaatregel
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-190
Integer Overflow or Wraparound
CWE-285
Improper Authorization
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-287
Improper Authentication
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.", "title": "Feiten" }, { "category": "description", "text": "Twee kwetsbaarheden in iOS en iPadOS 17.7.2 (CVE-2024-44308 \u0026 CVE-2024-44309) kunnen leiden tot het uitvoeren van willekeurige code. Apple geeft aan dat actief misbruik van deze kwetsbaarheden bekend is.\n\nEen kwaadwillende kan de kwetsbaarheden in iOS en iPadOS 18 misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Cross-Site Scripting (XSS)\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Manipulatie van gegevens\n* Omzeilen van authenticatie\n* Omzeilen van beveiligingsmaatregel", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Authorization", "title": "CWE-285" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5", "url": "https://support.apple.com/en-us/121754" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121250" } ], "title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS", "tracking": { "current_release_date": "2024-11-20T10:01:35.437557Z", "id": "NCSC-2024-0457", "initial_release_date": "2024-11-20T10:01:35.437557Z", "revision_history": [ { "date": "2024-11-20T10:01:35.437557Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "ipados__17.7", "product": { "name": "ipados__17.7", "product_id": "CSAFPID-1644313", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__17.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ipados__18", "product": { "name": "ipados__18", "product_id": "CSAFPID-1644314", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__18:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ios__18", "product": { "name": "ios__18", "product_id": "CSAFPID-1644312", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__18:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ios__17.7", "product": { "name": "ios__17.7", "product_id": "CSAFPID-1644315", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__17.7:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5841", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2023-5841" }, { "cve": "CVE-2024-27869", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27869.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27869" }, { "cve": "CVE-2024-27874", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27874" }, { "cve": "CVE-2024-27876", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27876.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27876" }, { "cve": "CVE-2024-27879", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27879", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27879.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27879" }, { "cve": "CVE-2024-27880", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27880", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27880.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27880" }, { "cve": "CVE-2024-40791", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40791" }, { "cve": "CVE-2024-40826", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40826", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40826.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40826" }, { "cve": "CVE-2024-40830", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40830", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40830.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40830" }, { "cve": "CVE-2024-40840", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40840", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40840.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40840" }, { "cve": "CVE-2024-40850", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40850", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40850.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40850" }, { "cve": "CVE-2024-40852", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40852", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40852.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40852" }, { "cve": "CVE-2024-40853", "references": [ { "category": "self", "summary": "CVE-2024-40853", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40853.json" } ], "title": "CVE-2024-40853" }, { "cve": "CVE-2024-40856", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40856", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40856.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40856" }, { "cve": "CVE-2024-40857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40857" }, { "cve": "CVE-2024-40863", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40863.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40863" }, { "cve": "CVE-2024-44123", "references": [ { "category": "self", "summary": "CVE-2024-44123", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44123.json" } ], "title": "CVE-2024-44123" }, { "cve": "CVE-2024-44124", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44124.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44124" }, { "cve": "CVE-2024-44126", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2024-44126", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44126.json" } ], "title": "CVE-2024-44126" }, { "cve": "CVE-2024-44127", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44127.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44127" }, { "cve": "CVE-2024-44131", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44131" }, { "cve": "CVE-2024-44139", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44139", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44139.json" } ], "title": "CVE-2024-44139" }, { "cve": "CVE-2024-44144", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-44144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44144.json" } ], "title": "CVE-2024-44144" }, { "cve": "CVE-2024-44145", "references": [ { "category": "self", "summary": "CVE-2024-44145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44145.json" } ], "title": "CVE-2024-44145" }, { "cve": "CVE-2024-44147", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44147.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44147" }, { "cve": "CVE-2024-44155", "references": [ { "category": "self", "summary": "CVE-2024-44155", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44155.json" } ], "title": "CVE-2024-44155" }, { "cve": "CVE-2024-44165", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44165.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44165" }, { "cve": "CVE-2024-44167", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44167" }, { "cve": "CVE-2024-44169", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44169" }, { "cve": "CVE-2024-44170", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44170.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44170" }, { "cve": "CVE-2024-44171", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44171" }, { "cve": "CVE-2024-44176", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44176" }, { "cve": "CVE-2024-44180", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44180.json" } ], "title": "CVE-2024-44180" }, { "cve": "CVE-2024-44183", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44183.json" } ], "title": "CVE-2024-44183" }, { "cve": "CVE-2024-44184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44184" }, { "cve": "CVE-2024-44187", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44187.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44187" }, { "cve": "CVE-2024-44191", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44191" }, { "cve": "CVE-2024-44198", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44198.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44198" }, { "cve": "CVE-2024-44202", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44202.json" } ], "title": "CVE-2024-44202" }, { "cve": "CVE-2024-44217", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-44217", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44217.json" } ], "title": "CVE-2024-44217" } ] }
NCSC-2024-0381
Vulnerability from csaf_ncscnl
Published
2024-09-26 08:48
Modified
2024-09-26 08:48
Summary
Kwetsbaarheden verholpen in Apple MacOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in MacOS
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van beveiligingsmaatregel
- Toegang tot gevoelige gegevens
- Toegang tot systeemgegevens
Voor succesvol misbruik moet de kwaadwillende lokale toegang hebben, het slachtoffer misleiden een malafide app te downloaden en installeren, of een malafide bestand te openen of link te volgen.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in MacOS 13.7, 14.7 en 15. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-208
Observable Timing Discrepancy
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-415
Double Free
CWE-265
CWE-265
CWE-203
Observable Discrepancy
CWE-190
Integer Overflow or Wraparound
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-285
Improper Authorization
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-377
Insecure Temporary File
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft kwetsbaarheden verholpen in MacOS", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- Toegang tot gevoelige gegevens\n- Toegang tot systeemgegevens\n\n\nVoor succesvol misbruik moet de kwaadwillende lokale toegang hebben, het slachtoffer misleiden een malafide app te downloaden en installeren, of een malafide bestand te openen of link te volgen.", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in MacOS 13.7, 14.7 en 15. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "CWE-265", "title": "CWE-265" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" }, { "category": "general", "text": "Improper Authorization", "title": "CWE-285" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Insecure Temporary File", "title": "CWE-377" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121247" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121234" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121238" } ], "title": "Kwetsbaarheden verholpen in Apple MacOS", "tracking": { "current_release_date": "2024-09-26T08:48:34.451990Z", "id": "NCSC-2024-0381", "initial_release_date": "2024-09-26T08:48:34.451990Z", "revision_history": [ { "date": "2024-09-26T08:48:34.451990Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "macos_sequoia__15", "product": { "name": "macos_sequoia__15", "product_id": "CSAFPID-1644309", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_sequoia__15:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "macos_sonoma__14.7", "product": { "name": "macos_sonoma__14.7", "product_id": "CSAFPID-1644310", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_sonoma__14.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "macos_ventura__13.7", "product": { "name": "macos_ventura__13.7", "product_id": "CSAFPID-1644311", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_ventura__13.7:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44154", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44154", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44154.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44154" }, { "cve": "CVE-2024-44158", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44158.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44158" }, { "cve": "CVE-2024-44160", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44160.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44160" }, { "cve": "CVE-2024-44161", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44161.json" } ], "title": "CVE-2024-44161" }, { "cve": "CVE-2024-44163", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44163", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44163.json" } ], "title": "CVE-2024-44163" }, { "cve": "CVE-2024-44164", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44164", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44164.json" } ], "title": "CVE-2024-44164" }, { "cve": "CVE-2024-44165", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44165.json" } ], "title": "CVE-2024-44165" }, { "cve": "CVE-2024-44166", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44166", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44166.json" } ], "title": "CVE-2024-44166" }, { "cve": "CVE-2024-44167", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44167" }, { "cve": "CVE-2024-44168", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44168", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44168.json" } ], "title": "CVE-2024-44168" }, { "cve": "CVE-2024-44169", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44169" }, { "cve": "CVE-2024-44170", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44170.json" } ], "title": "CVE-2024-44170" }, { "cve": "CVE-2024-44176", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44176" }, { "cve": "CVE-2024-44177", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44177.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44177" }, { "cve": "CVE-2024-44178", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44178.json" } ], "title": "CVE-2024-44178" }, { "cve": "CVE-2024-44181", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "notes": [ { "category": "other", "text": "Insecure Temporary File", "title": "CWE-377" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44181", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44181.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44181" }, { "cve": "CVE-2024-44182", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44182" }, { "cve": "CVE-2024-44183", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44183.json" } ], "title": "CVE-2024-44183" }, { "cve": "CVE-2024-44184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44184" }, { "cve": "CVE-2024-44186", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44186", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44186.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44186" }, { "cve": "CVE-2024-44187", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44187.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44187" }, { "cve": "CVE-2024-44188", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44188", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44188.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44188" }, { "cve": "CVE-2024-44189", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44189", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44189.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44189" }, { "cve": "CVE-2024-44190", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44190", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44190.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44190" }, { "cve": "CVE-2024-44191", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44191" }, { "cve": "CVE-2024-44198", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44198.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44198" }, { "cve": "CVE-2023-4504", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4504", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4504.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2023-4504" }, { "cve": "CVE-2023-5841", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2023-5841" }, { "cve": "CVE-2024-23237", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23237.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-23237" }, { "cve": "CVE-2024-27795", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27795" }, { "cve": "CVE-2024-27858", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27858", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27858.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27858" }, { "cve": "CVE-2024-27860", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27860", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27860.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27860" }, { "cve": "CVE-2024-27861", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27861", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27861.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27861" }, { "cve": "CVE-2024-27869", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27869.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27869" }, { "cve": "CVE-2024-27875", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27875", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27875.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27875" }, { "cve": "CVE-2024-27876", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27876.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27876" }, { "cve": "CVE-2024-27880", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27880", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27880.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27880" }, { "cve": "CVE-2024-27886", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27886", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27886.json" } ], "title": "CVE-2024-27886" }, { "cve": "CVE-2024-39894", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39894", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39894.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-39894" }, { "cve": "CVE-2024-40770", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40770", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40770.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40770" }, { "cve": "CVE-2024-40791", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40791" }, { "cve": "CVE-2024-40797", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40797", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40797.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40797" }, { "cve": "CVE-2024-40801", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40801" }, { "cve": "CVE-2024-40814", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40814", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40814.json" } ], "title": "CVE-2024-40814" }, { "cve": "CVE-2024-40825", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40825", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40825.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40825" }, { "cve": "CVE-2024-40826", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40826", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40826.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40826" }, { "cve": "CVE-2024-40831", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40831", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40831.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40831" }, { "cve": "CVE-2024-40837", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40837", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40837.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40837" }, { "cve": "CVE-2024-40838", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40838", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40838.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40838" }, { "cve": "CVE-2024-40841", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40841" }, { "cve": "CVE-2024-40842", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40842", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40842.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40842" }, { "cve": "CVE-2024-40843", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40843", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40843.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40843" }, { "cve": "CVE-2024-40844", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40844", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40844.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40844" }, { "cve": "CVE-2024-40845", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40845", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40845.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40845" }, { "cve": "CVE-2024-40846", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40846", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40846.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40846" }, { "cve": "CVE-2024-40847", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40847", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40847.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40847" }, { "cve": "CVE-2024-40848", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40848", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40848.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40848" }, { "cve": "CVE-2024-40850", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40850", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40850.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40850" }, { "cve": "CVE-2024-40856", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40856", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40856.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40856" }, { "cve": "CVE-2024-40857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40857" }, { "cve": "CVE-2024-40859", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40859", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40859.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40859" }, { "cve": "CVE-2024-40860", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40860", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40860.json" } ], "title": "CVE-2024-40860" }, { "cve": "CVE-2024-40861", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40861", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40861.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40861" }, { "cve": "CVE-2024-40866", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40866", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40866.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40866" }, { "cve": "CVE-2024-41957", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41957", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41957.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-41957" }, { "cve": "CVE-2024-44125", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44125", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44125.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44125" }, { "cve": "CVE-2024-44128", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44128.json" } ], "title": "CVE-2024-44128" }, { "cve": "CVE-2024-44129", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44129", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44129.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44129" }, { "cve": "CVE-2024-44130", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44130" }, { "cve": "CVE-2024-44131", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44131" }, { "cve": "CVE-2024-44132", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "other", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44132", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44132.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44132" }, { "cve": "CVE-2024-44133", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44133" }, { "cve": "CVE-2024-44134", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44134", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44134.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44134" }, { "cve": "CVE-2024-44135", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44135.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44135" }, { "cve": "CVE-2024-44146", "cwe": { "id": "CWE-265", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-265", "title": "CWE-265" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44146", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44146.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44146" }, { "cve": "CVE-2024-44148", "cwe": { "id": "CWE-265", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-265", "title": "CWE-265" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44148", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44148.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44148" }, { "cve": "CVE-2024-44149", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44149", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44149.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44149" }, { "cve": "CVE-2024-44151", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44151", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44151.json" } ], "title": "CVE-2024-44151" }, { "cve": "CVE-2024-44152", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44152", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44152.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44152" }, { "cve": "CVE-2024-44153", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44153", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44153.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44153" } ] }
ncsc-2024-0381
Vulnerability from csaf_ncscnl
Published
2024-09-26 08:48
Modified
2024-09-26 08:48
Summary
Kwetsbaarheden verholpen in Apple MacOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in MacOS
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van beveiligingsmaatregel
- Toegang tot gevoelige gegevens
- Toegang tot systeemgegevens
Voor succesvol misbruik moet de kwaadwillende lokale toegang hebben, het slachtoffer misleiden een malafide app te downloaden en installeren, of een malafide bestand te openen of link te volgen.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in MacOS 13.7, 14.7 en 15. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-208
Observable Timing Discrepancy
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-415
Double Free
CWE-265
CWE-265
CWE-203
Observable Discrepancy
CWE-190
Integer Overflow or Wraparound
CWE-61
UNIX Symbolic Link (Symlink) Following
CWE-285
Improper Authorization
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-377
Insecure Temporary File
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft kwetsbaarheden verholpen in MacOS", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- Toegang tot gevoelige gegevens\n- Toegang tot systeemgegevens\n\n\nVoor succesvol misbruik moet de kwaadwillende lokale toegang hebben, het slachtoffer misleiden een malafide app te downloaden en installeren, of een malafide bestand te openen of link te volgen.", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in MacOS 13.7, 14.7 en 15. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "CWE-265", "title": "CWE-265" }, { "category": "general", "text": "Observable Discrepancy", "title": "CWE-203" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" }, { "category": "general", "text": "Improper Authorization", "title": "CWE-285" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Insecure Temporary File", "title": "CWE-377" }, { "category": "general", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121247" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121234" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121238" } ], "title": "Kwetsbaarheden verholpen in Apple MacOS", "tracking": { "current_release_date": "2024-09-26T08:48:34.451990Z", "id": "NCSC-2024-0381", "initial_release_date": "2024-09-26T08:48:34.451990Z", "revision_history": [ { "date": "2024-09-26T08:48:34.451990Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "macos_sequoia__15", "product": { "name": "macos_sequoia__15", "product_id": "CSAFPID-1644309", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_sequoia__15:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "macos_sonoma__14.7", "product": { "name": "macos_sonoma__14.7", "product_id": "CSAFPID-1644310", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_sonoma__14.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "macos_ventura__13.7", "product": { "name": "macos_ventura__13.7", "product_id": "CSAFPID-1644311", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:macos_ventura__13.7:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-44154", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44154", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44154.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44154" }, { "cve": "CVE-2024-44158", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44158.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44158" }, { "cve": "CVE-2024-44160", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44160", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44160.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44160" }, { "cve": "CVE-2024-44161", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44161", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44161.json" } ], "title": "CVE-2024-44161" }, { "cve": "CVE-2024-44163", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44163", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44163.json" } ], "title": "CVE-2024-44163" }, { "cve": "CVE-2024-44164", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44164", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44164.json" } ], "title": "CVE-2024-44164" }, { "cve": "CVE-2024-44165", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44165.json" } ], "title": "CVE-2024-44165" }, { "cve": "CVE-2024-44166", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44166", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44166.json" } ], "title": "CVE-2024-44166" }, { "cve": "CVE-2024-44167", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44167" }, { "cve": "CVE-2024-44168", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44168", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44168.json" } ], "title": "CVE-2024-44168" }, { "cve": "CVE-2024-44169", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44169" }, { "cve": "CVE-2024-44170", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44170.json" } ], "title": "CVE-2024-44170" }, { "cve": "CVE-2024-44176", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44176" }, { "cve": "CVE-2024-44177", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44177", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44177.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44177" }, { "cve": "CVE-2024-44178", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44178.json" } ], "title": "CVE-2024-44178" }, { "cve": "CVE-2024-44181", "cwe": { "id": "CWE-377", "name": "Insecure Temporary File" }, "notes": [ { "category": "other", "text": "Insecure Temporary File", "title": "CWE-377" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44181", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44181.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44181" }, { "cve": "CVE-2024-44182", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44182.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44182" }, { "cve": "CVE-2024-44183", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44183.json" } ], "title": "CVE-2024-44183" }, { "cve": "CVE-2024-44184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44184" }, { "cve": "CVE-2024-44186", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44186", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44186.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44186" }, { "cve": "CVE-2024-44187", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44187.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44187" }, { "cve": "CVE-2024-44188", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44188", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44188.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44188" }, { "cve": "CVE-2024-44189", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44189", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44189.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44189" }, { "cve": "CVE-2024-44190", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "notes": [ { "category": "other", "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "title": "CWE-22" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44190", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44190.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44190" }, { "cve": "CVE-2024-44191", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44191" }, { "cve": "CVE-2024-44198", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44198.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44198" }, { "cve": "CVE-2023-4504", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2023-4504", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4504.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2023-4504" }, { "cve": "CVE-2023-5841", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2023-5841" }, { "cve": "CVE-2024-23237", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-23237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23237.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-23237" }, { "cve": "CVE-2024-27795", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27795", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27795.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27795" }, { "cve": "CVE-2024-27858", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27858", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27858.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27858" }, { "cve": "CVE-2024-27860", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27860", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27860.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27860" }, { "cve": "CVE-2024-27861", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27861", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27861.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27861" }, { "cve": "CVE-2024-27869", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27869.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27869" }, { "cve": "CVE-2024-27875", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27875", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27875.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27875" }, { "cve": "CVE-2024-27876", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27876.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27876" }, { "cve": "CVE-2024-27880", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27880", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27880.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-27880" }, { "cve": "CVE-2024-27886", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27886", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27886.json" } ], "title": "CVE-2024-27886" }, { "cve": "CVE-2024-39894", "cwe": { "id": "CWE-208", "name": "Observable Timing Discrepancy" }, "notes": [ { "category": "other", "text": "Observable Timing Discrepancy", "title": "CWE-208" }, { "category": "other", "text": "Observable Discrepancy", "title": "CWE-203" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-39894", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39894.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-39894" }, { "cve": "CVE-2024-40770", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40770", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40770.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40770" }, { "cve": "CVE-2024-40791", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40791" }, { "cve": "CVE-2024-40797", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40797", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40797.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40797" }, { "cve": "CVE-2024-40801", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40801", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40801.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40801" }, { "cve": "CVE-2024-40814", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40814", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40814.json" } ], "title": "CVE-2024-40814" }, { "cve": "CVE-2024-40825", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40825", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40825.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40825" }, { "cve": "CVE-2024-40826", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40826", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40826.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40826" }, { "cve": "CVE-2024-40831", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40831", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40831.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40831" }, { "cve": "CVE-2024-40837", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40837", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40837.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40837" }, { "cve": "CVE-2024-40838", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40838", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40838.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40838" }, { "cve": "CVE-2024-40841", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40841" }, { "cve": "CVE-2024-40842", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40842", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40842.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40842" }, { "cve": "CVE-2024-40843", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40843", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40843.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40843" }, { "cve": "CVE-2024-40844", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40844", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40844.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40844" }, { "cve": "CVE-2024-40845", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40845", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40845.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40845" }, { "cve": "CVE-2024-40846", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40846", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40846.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40846" }, { "cve": "CVE-2024-40847", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40847", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40847.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40847" }, { "cve": "CVE-2024-40848", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40848", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40848.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40848" }, { "cve": "CVE-2024-40850", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40850", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40850.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40850" }, { "cve": "CVE-2024-40856", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40856", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40856.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40856" }, { "cve": "CVE-2024-40857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40857" }, { "cve": "CVE-2024-40859", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40859", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40859.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40859" }, { "cve": "CVE-2024-40860", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40860", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40860.json" } ], "title": "CVE-2024-40860" }, { "cve": "CVE-2024-40861", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40861", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40861.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40861" }, { "cve": "CVE-2024-40866", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40866", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40866.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-40866" }, { "cve": "CVE-2024-41957", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-41957", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41957.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-41957" }, { "cve": "CVE-2024-44125", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44125", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44125.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44125" }, { "cve": "CVE-2024-44128", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44128", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44128.json" } ], "title": "CVE-2024-44128" }, { "cve": "CVE-2024-44129", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44129", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44129.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44129" }, { "cve": "CVE-2024-44130", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44130", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44130.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44130" }, { "cve": "CVE-2024-44131", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44131" }, { "cve": "CVE-2024-44132", "cwe": { "id": "CWE-61", "name": "UNIX Symbolic Link (Symlink) Following" }, "notes": [ { "category": "other", "text": "UNIX Symbolic Link (Symlink) Following", "title": "CWE-61" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44132", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44132.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44132" }, { "cve": "CVE-2024-44133", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44133", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44133.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44133" }, { "cve": "CVE-2024-44134", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44134", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44134.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44134" }, { "cve": "CVE-2024-44135", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44135", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44135.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44135" }, { "cve": "CVE-2024-44146", "cwe": { "id": "CWE-265", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-265", "title": "CWE-265" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44146", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44146.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44146" }, { "cve": "CVE-2024-44148", "cwe": { "id": "CWE-265", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-265", "title": "CWE-265" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44148", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44148.json" } ], "scores": [ { "cvss_v3": { "baseScore": 10.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44148" }, { "cve": "CVE-2024-44149", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44149", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44149.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44149" }, { "cve": "CVE-2024-44151", "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44151", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44151.json" } ], "title": "CVE-2024-44151" }, { "cve": "CVE-2024-44152", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44152", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44152.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44152" }, { "cve": "CVE-2024-44153", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44153", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44153.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644309", "CSAFPID-1644310", "CSAFPID-1644311" ] } ], "title": "CVE-2024-44153" } ] }
NCSC-2024-0382
Vulnerability from csaf_ncscnl
Published
2024-09-26 08:52
Modified
2024-09-26 08:52
Summary
Kwetsbaarheden verholpen in Apple iOS en iPadOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Cross-Site-Scripting (XSS)
- Denial-of-Service (DoS)
- Manipulatie van gegevens
- Omzeilen van beveiligingsmaatregel
- Toegang tot gevoelige gegevens
- Toegang tot systeemgegevens
Voor succesvol misbruik moet de kwaadwillende fysieke toegang hebben tot het kwetsbare apparaat, het slachtoffer misleiden een malafide app te installeren en draaien of een malafide link te volgen.
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in iOS en iPadOS 17.7 en 18. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-190
Integer Overflow or Wraparound
CWE-285
Improper Authorization
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-287
Improper Authentication
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft kwetsbaarheden verholpen in iOS en iPadOS.", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Cross-Site-Scripting (XSS)\n- Denial-of-Service (DoS)\n- Manipulatie van gegevens\n- Omzeilen van beveiligingsmaatregel\n- Toegang tot gevoelige gegevens\n- Toegang tot systeemgegevens\n\nVoor succesvol misbruik moet de kwaadwillende fysieke toegang hebben tot het kwetsbare apparaat, het slachtoffer misleiden een malafide app te installeren en draaien of een malafide link te volgen.\n", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen in iOS en iPadOS 17.7 en 18. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Authorization", "title": "CWE-285" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121250" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121246" } ], "title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS", "tracking": { "current_release_date": "2024-09-26T08:52:21.805564Z", "id": "NCSC-2024-0382", "initial_release_date": "2024-09-26T08:52:21.805564Z", "revision_history": [ { "date": "2024-09-26T08:52:21.805564Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "ios__17.7", "product": { "name": "ios__17.7", "product_id": "CSAFPID-1644315", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__17.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ios__18", "product": { "name": "ios__18", "product_id": "CSAFPID-1644312", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__18:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ipados__17.7", "product": { "name": "ipados__17.7", "product_id": "CSAFPID-1644313", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__17.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ipados__18", "product": { "name": "ipados__18", "product_id": "CSAFPID-1644314", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__18:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5841", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2023-5841" }, { "cve": "CVE-2024-27869", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27869.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27869" }, { "cve": "CVE-2024-27874", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27874" }, { "cve": "CVE-2024-27876", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27876.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27876" }, { "cve": "CVE-2024-27879", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27879", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27879.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27879" }, { "cve": "CVE-2024-27880", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27880", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27880.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27880" }, { "cve": "CVE-2024-40791", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40791" }, { "cve": "CVE-2024-40826", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40826", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40826.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40826" }, { "cve": "CVE-2024-40830", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40830", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40830.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40830" }, { "cve": "CVE-2024-40840", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40840", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40840.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40840" }, { "cve": "CVE-2024-40844", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40844", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40844.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40844" }, { "cve": "CVE-2024-40850", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40850", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40850.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40850" }, { "cve": "CVE-2024-40852", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40852", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40852.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40852" }, { "cve": "CVE-2024-40856", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40856", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40856.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40856" }, { "cve": "CVE-2024-40857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40857" }, { "cve": "CVE-2024-40863", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40863.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40863" }, { "cve": "CVE-2024-44124", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44124.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44124" }, { "cve": "CVE-2024-44127", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44127.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44127" }, { "cve": "CVE-2024-44131", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44131" }, { "cve": "CVE-2024-44139", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44139", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44139.json" } ], "title": "CVE-2024-44139" }, { "cve": "CVE-2024-44147", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44147.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44147" }, { "cve": "CVE-2024-44158", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44158", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44158.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44158" }, { "cve": "CVE-2024-44164", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44164", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44164.json" } ], "title": "CVE-2024-44164" }, { "cve": "CVE-2024-44165", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44165.json" } ], "title": "CVE-2024-44165" }, { "cve": "CVE-2024-44167", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44167" }, { "cve": "CVE-2024-44169", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44169" }, { "cve": "CVE-2024-44170", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44170.json" } ], "title": "CVE-2024-44170" }, { "cve": "CVE-2024-44171", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44171" }, { "cve": "CVE-2024-44176", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44176" }, { "cve": "CVE-2024-44180", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44180.json" } ], "title": "CVE-2024-44180" }, { "cve": "CVE-2024-44183", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44183.json" } ], "title": "CVE-2024-44183" }, { "cve": "CVE-2024-44184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44184" }, { "cve": "CVE-2024-44187", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44187.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44187" }, { "cve": "CVE-2024-44191", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44191" }, { "cve": "CVE-2024-44198", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44198.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44198" }, { "cve": "CVE-2024-44202", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44202.json" } ], "title": "CVE-2024-44202" } ] }
NCSC-2024-0457
Vulnerability from csaf_ncscnl
Published
2024-11-20 10:01
Modified
2024-11-20 10:01
Summary
Kwetsbaarheden verholpen in Apple iOS en iPadOS
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.
Interpretaties
Twee kwetsbaarheden in iOS en iPadOS 17.7.2 (CVE-2024-44308 & CVE-2024-44309) kunnen leiden tot het uitvoeren van willekeurige code. Apple geeft aan dat actief misbruik van deze kwetsbaarheden bekend is.
Een kwaadwillende kan de kwetsbaarheden in iOS en iPadOS 18 misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
* Cross-Site Scripting (XSS)
* Denial-of-Service (DoS)
* Toegang tot gevoelige gegevens
* Manipulatie van gegevens
* Omzeilen van authenticatie
* Omzeilen van beveiligingsmaatregel
Oplossingen
Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CWE-190
Integer Overflow or Wraparound
CWE-285
Improper Authorization
CWE-404
Improper Resource Shutdown or Release
CWE-275
CWE-275
CWE-284
Improper Access Control
CWE-787
Out-of-bounds Write
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-122
Heap-based Buffer Overflow
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CWE-287
Improper Authentication
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.", "title": "Feiten" }, { "category": "description", "text": "Twee kwetsbaarheden in iOS en iPadOS 17.7.2 (CVE-2024-44308 \u0026 CVE-2024-44309) kunnen leiden tot het uitvoeren van willekeurige code. Apple geeft aan dat actief misbruik van deze kwetsbaarheden bekend is.\n\nEen kwaadwillende kan de kwetsbaarheden in iOS en iPadOS 18 misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Cross-Site Scripting (XSS)\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Manipulatie van gegevens\n* Omzeilen van authenticatie\n* Omzeilen van beveiligingsmaatregel", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" }, { "category": "general", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Improper Authorization", "title": "CWE-285" }, { "category": "general", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5", "url": "https://support.apple.com/en-us/121754" }, { "category": "external", "summary": "Reference - certbundde; cveprojectv5; hkcert; nvd", "url": "https://support.apple.com/en-us/121250" } ], "title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS", "tracking": { "current_release_date": "2024-11-20T10:01:35.437557Z", "id": "NCSC-2024-0457", "initial_release_date": "2024-11-20T10:01:35.437557Z", "revision_history": [ { "date": "2024-11-20T10:01:35.437557Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "ipados__17.7", "product": { "name": "ipados__17.7", "product_id": "CSAFPID-1644313", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__17.7:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ipados__18", "product": { "name": "ipados__18", "product_id": "CSAFPID-1644314", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ipados__18:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ios__18", "product": { "name": "ios__18", "product_id": "CSAFPID-1644312", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__18:*:*:*:*:*:*:*:*" } } }, { "category": "product_name", "name": "ios__17.7", "product": { "name": "ios__17.7", "product_id": "CSAFPID-1644315", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:ios__17.7:*:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-5841", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2023-5841", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5841.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2023-5841" }, { "cve": "CVE-2024-27869", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27869", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27869.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27869" }, { "cve": "CVE-2024-27874", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27874", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27874.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27874" }, { "cve": "CVE-2024-27876", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27876", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27876.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27876" }, { "cve": "CVE-2024-27879", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27879", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27879.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27879" }, { "cve": "CVE-2024-27880", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-27880", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27880.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-27880" }, { "cve": "CVE-2024-40791", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40791", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40791.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40791" }, { "cve": "CVE-2024-40826", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40826", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40826.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40826" }, { "cve": "CVE-2024-40830", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40830", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40830.json" } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40830" }, { "cve": "CVE-2024-40840", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40840", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40840.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40840" }, { "cve": "CVE-2024-40850", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40850", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40850.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40850" }, { "cve": "CVE-2024-40852", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40852", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40852.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40852" }, { "cve": "CVE-2024-40853", "references": [ { "category": "self", "summary": "CVE-2024-40853", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40853.json" } ], "title": "CVE-2024-40853" }, { "cve": "CVE-2024-40856", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40856", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40856.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40856" }, { "cve": "CVE-2024-40857", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "notes": [ { "category": "other", "text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "title": "CWE-79" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40857", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40857.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40857" }, { "cve": "CVE-2024-40863", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40863", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40863.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-40863" }, { "cve": "CVE-2024-44123", "references": [ { "category": "self", "summary": "CVE-2024-44123", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44123.json" } ], "title": "CVE-2024-44123" }, { "cve": "CVE-2024-44124", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44124", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44124.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44124" }, { "cve": "CVE-2024-44126", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "references": [ { "category": "self", "summary": "CVE-2024-44126", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44126.json" } ], "title": "CVE-2024-44126" }, { "cve": "CVE-2024-44127", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44127", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44127.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44127" }, { "cve": "CVE-2024-44131", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44131", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44131.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44131" }, { "cve": "CVE-2024-44139", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44139", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44139.json" } ], "title": "CVE-2024-44139" }, { "cve": "CVE-2024-44144", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "other", "text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "title": "CWE-120" } ], "references": [ { "category": "self", "summary": "CVE-2024-44144", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44144.json" } ], "title": "CVE-2024-44144" }, { "cve": "CVE-2024-44145", "references": [ { "category": "self", "summary": "CVE-2024-44145", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44145.json" } ], "title": "CVE-2024-44145" }, { "cve": "CVE-2024-44147", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44147", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44147.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44147" }, { "cve": "CVE-2024-44155", "references": [ { "category": "self", "summary": "CVE-2024-44155", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44155.json" } ], "title": "CVE-2024-44155" }, { "cve": "CVE-2024-44165", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44165", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44165.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44165" }, { "cve": "CVE-2024-44167", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44167" }, { "cve": "CVE-2024-44169", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44169", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44169.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44169" }, { "cve": "CVE-2024-44170", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44170.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44170" }, { "cve": "CVE-2024-44171", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44171" }, { "cve": "CVE-2024-44176", "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44176", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44176.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44176" }, { "cve": "CVE-2024-44180", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44180.json" } ], "title": "CVE-2024-44180" }, { "cve": "CVE-2024-44183", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "notes": [ { "category": "other", "text": "Improper Resource Shutdown or Release", "title": "CWE-404" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44183.json" } ], "title": "CVE-2024-44183" }, { "cve": "CVE-2024-44184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44184.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44184" }, { "cve": "CVE-2024-44187", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "notes": [ { "category": "other", "text": "Permissive Cross-domain Policy with Untrusted Domains", "title": "CWE-942" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44187.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44187" }, { "cve": "CVE-2024-44191", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "other", "text": "Improper Authorization", "title": "CWE-285" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44191" }, { "cve": "CVE-2024-44198", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44198.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] } ], "title": "CVE-2024-44198" }, { "cve": "CVE-2024-44202", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "product_status": { "known_affected": [ "CSAFPID-1644312", "CSAFPID-1644313", "CSAFPID-1644314", "CSAFPID-1644315" ] }, "references": [ { "category": "self", "summary": "CVE-2024-44202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44202.json" } ], "title": "CVE-2024-44202" }, { "cve": "CVE-2024-44217", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-44217", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-44217.json" } ], "title": "CVE-2024-44217" } ] }
rhsa-2024_8180
Vulnerability from csaf_redhat
Published
2024-10-16 13:09
Modified
2024-12-17 18:54
Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8180", "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8180.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2024-12-17T18:54:31+00:00", "generator": { "date": "2024-12-17T18:54:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:8180", "initial_release_date": "2024-10-16T13:09:14+00:00", "revision_history": [ { "date": "2024-10-16T13:09:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-16T13:09:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T18:54:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-2.el9_4.src", "product": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.src", "product_id": "webkit2gtk3-0:2.46.1-2.el9_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-2.el9_4?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-2.el9_4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src" }, "product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.src", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23271", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2024-09-25T15:33:21.499000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314696" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23271" }, { "category": "external", "summary": "RHBZ#2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27838", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-09-25T15:42:35.706000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314702" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27838" }, { "category": "external", "summary": "RHBZ#2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-16T13:09:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.src", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.1-2.el9_4.x86_64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.aarch64", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.i686", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.ppc64le", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.s390x", "AppStream-9.4.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-2.el9_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" } ] }
rhsa-2024_9636
Vulnerability from csaf_redhat
Published
2024-11-14 10:17
Modified
2024-12-17 18:55
Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* chromium-browser: Use after free in ANGLE (CVE-2024-4558)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)
* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)
* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)
* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)
* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)
* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9636", "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9636.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2024-12-17T18:55:28+00:00", "generator": { "date": "2024-12-17T18:55:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:9636", "initial_release_date": "2024-11-14T10:17:10+00:00", "revision_history": [ { "date": "2024-11-14T10:17:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-14T10:17:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T18:55:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_10.src", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.src", "product_id": "webkit2gtk3-0:2.46.3-1.el8_10.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_10?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_10?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.src", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23271", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Policy with Untrusted Domains" }, "discovery_date": "2024-09-25T15:33:21.499000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314696" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23271" }, { "category": "external", "summary": "RHBZ#2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27838", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-09-25T15:42:35.706000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314702" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27838" }, { "category": "external", "summary": "RHBZ#2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44296", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2024-11-01T21:16:26.289000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323289" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44296" }, { "category": "external", "summary": "RHBZ#2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T10:17:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.src", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_10.x86_64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.aarch64", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.i686", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.ppc64le", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.s390x", "AppStream-8.10.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" } ] }
rhsa-2024_9553
Vulnerability from csaf_redhat
Published
2024-11-13 15:29
Modified
2024-12-17 18:55
Summary
Red Hat Security Advisory: webkit2gtk3 security update
Notes
Topic
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
Security Fix(es):
* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)
* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)
* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9553", "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9553.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2024-12-17T18:55:17+00:00", "generator": { "date": "2024-12-17T18:55:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:9553", "initial_release_date": "2024-11-13T15:29:19+00:00", "revision_history": [ { "date": "2024-11-13T15:29:19+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-13T15:29:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T18:55:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el9_5.src", "product": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.src", "product_id": "webkit2gtk3-0:2.46.3-1.el9_5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el9_5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el9_5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.src", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "relates_to_product_reference": "AppStream-9.5.0.Z.MAIN" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T15:29:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T15:29:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T15:29:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T15:29:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44296", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2024-11-01T21:16:26.289000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323289" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44296" }, { "category": "external", "summary": "RHBZ#2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-13T15:29:19+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.src", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-debugsource-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-0:2.46.3-1.el9_5.x86_64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.aarch64", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.i686", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.ppc64le", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.s390x", "AppStream-9.5.0.Z.MAIN:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el9_5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" } ] }
ghsa-xmf6-p99q-898v
Vulnerability from github
Published
2024-09-17 00:31
Modified
2024-09-25 15:31
Severity ?
Details
A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin.
{ "affected": [], "aliases": [ "CVE-2024-44187" ], "database_specific": { "cwe_ids": [ "CWE-346" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-09-17T00:15:52Z", "severity": "MODERATE" }, "details": "A cross-origin issue existed with \"iframe\" elements. This was addressed with improved tracking of security origins. This issue is fixed in Safari 18, visionOS 2, watchOS 11, macOS Sequoia 15, iOS 18 and iPadOS 18, tvOS 18. A malicious website may exfiltrate data cross-origin.", "id": "GHSA-xmf6-p99q-898v", "modified": "2024-09-25T15:31:11Z", "published": "2024-09-17T00:31:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "type": "WEB", "url": "https://support.apple.com/en-us/121238" }, { "type": "WEB", "url": "https://support.apple.com/en-us/121240" }, { "type": "WEB", "url": "https://support.apple.com/en-us/121241" }, { "type": "WEB", "url": "https://support.apple.com/en-us/121248" }, { "type": "WEB", "url": "https://support.apple.com/en-us/121249" }, { "type": "WEB", "url": "https://support.apple.com/en-us/121250" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.